Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47?arch=el5rt
Typerpm
Namespaceredhat
Namekernel-rt
Version2.6.33.7-rt29.47
Qualifiers
arch el5rt
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-22bx-f76m-e3c1
vulnerability_id VCID-22bx-f76m-e3c1
summary kernel: CAN minor heap overflow
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
6
reference_url http://openwall.com/lists/oss-security/2010/11/03/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/03/3
7
reference_url http://openwall.com/lists/oss-security/2010/11/04/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/4
8
reference_url http://openwall.com/lists/oss-security/2010/12/20/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/20/2
9
reference_url http://openwall.com/lists/oss-security/2010/12/20/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/20/3
10
reference_url http://openwall.com/lists/oss-security/2010/12/20/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/20/4
11
reference_url http://openwall.com/lists/oss-security/2010/12/20/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/20/5
12
reference_url http://openwall.com/lists/oss-security/2010/12/21/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/21/1
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3874.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3874.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3874
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26312
published_at 2026-04-29T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26599
published_at 2026-04-01T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26645
published_at 2026-04-02T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26688
published_at 2026-04-04T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26541
published_at 2026-04-08T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.2659
published_at 2026-04-09T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26596
published_at 2026-04-11T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26551
published_at 2026-04-12T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26494
published_at 2026-04-13T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.265
published_at 2026-04-16T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26472
published_at 2026-04-18T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.26434
published_at 2026-04-21T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26373
published_at 2026-04-24T12:55:00Z
14
value 0.00096
scoring_system epss
scoring_elements 0.26366
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3874
15
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
16
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
17
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
18
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
19
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
20
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
21
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
22
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.spinics.net/lists/netdev/msg145791.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145791.html
26
reference_url http://www.spinics.net/lists/netdev/msg146469.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146469.html
27
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
28
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
29
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
30
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=649695
reference_id 649695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=649695
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3874
reference_id CVE-2010-3874
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3874
41
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
42
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
43
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
44
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
45
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
46
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
47
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
48
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3874
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22bx-f76m-e3c1
1
url VCID-2m8w-7whg-jube
vulnerability_id VCID-2m8w-7whg-jube
summary kernel: logic error in INET_DIAG bytecode auditing
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
1
reference_url http://openwall.com/lists/oss-security/2010/11/04/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/9
2
reference_url http://openwall.com/lists/oss-security/2010/11/05/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/05/3
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3880.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3880.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3880
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31671
published_at 2026-04-29T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32057
published_at 2026-04-01T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32184
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32222
published_at 2026-04-04T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32048
published_at 2026-04-07T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32099
published_at 2026-04-08T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32127
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32132
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32093
published_at 2026-04-12T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32062
published_at 2026-04-13T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.32096
published_at 2026-04-16T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32073
published_at 2026-04-18T12:55:00Z
12
value 0.00127
scoring_system epss
scoring_elements 0.32046
published_at 2026-04-21T12:55:00Z
13
value 0.00127
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-24T12:55:00Z
14
value 0.00127
scoring_system epss
scoring_elements 0.31754
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3880
5
reference_url http://secunia.com/advisories/42126
reference_id
reference_type
scores
url http://secunia.com/advisories/42126
6
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
7
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
8
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
9
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
14
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
15
reference_url http://www.securityfocus.com/bid/44665
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44665
16
reference_url http://www.spinics.net/lists/netdev/msg145899.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg145899.html
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
18
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651264
reference_id 651264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651264
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3880
reference_id CVE-2010-3880
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3880
25
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
26
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
27
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
28
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
29
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
30
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
31
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
32
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
33
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
34
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
35
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
36
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
37
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3880
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2m8w-7whg-jube
2
url VCID-3egz-urd4-yfbw
vulnerability_id VCID-3egz-urd4-yfbw
summary kernel: heap contents leak from ETHTOOL_GRXCLSRLALL
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://openwall.com/lists/oss-security/2010/10/25/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/10/25/4
6
reference_url http://openwall.com/lists/oss-security/2010/10/26/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/10/26/1
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3861.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3861.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3861
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16093
published_at 2026-04-29T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16185
published_at 2026-04-01T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16368
published_at 2026-04-02T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1643
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16227
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16313
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16377
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16359
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16319
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16252
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16188
published_at 2026-04-16T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16207
published_at 2026-04-18T12:55:00Z
12
value 0.00052
scoring_system epss
scoring_elements 0.16244
published_at 2026-04-21T12:55:00Z
13
value 0.00052
scoring_system epss
scoring_elements 0.16135
published_at 2026-04-24T12:55:00Z
14
value 0.00052
scoring_system epss
scoring_elements 0.16133
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3861
9
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
10
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
11
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
12
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
13
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
17
reference_url http://www.securityfocus.com/bid/44427
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44427
18
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
19
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
20
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
21
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
22
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=646725
reference_id 646725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=646725
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3861
reference_id CVE-2010-3861
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3861
34
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
35
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
36
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
37
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
38
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
39
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
40
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
41
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-3861
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3egz-urd4-yfbw
3
url VCID-519v-6b9u-dygr
vulnerability_id VCID-519v-6b9u-dygr
summary kernel: drivers/serial/serial_core.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
1
reference_url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
reference_id
reference_type
scores
url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4075
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4075
4
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
5
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
6
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
9
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
17
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/43806
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43806
19
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
20
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648660
reference_id 648660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648660
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4075
reference_id CVE-2010-4075
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4075
24
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
25
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
26
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
27
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
28
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
29
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
30
reference_url https://usn.ubuntu.com/1090-1/
reference_id USN-1090-1
reference_type
scores
url https://usn.ubuntu.com/1090-1/
31
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
34
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
35
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
36
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4075
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-519v-6b9u-dygr
4
url VCID-5x5t-fnw6-kqea
vulnerability_id VCID-5x5t-fnw6-kqea
summary kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lkml.org/lkml/2010/9/25/41
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/25/41
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4080
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23958
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24123
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24017
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23992
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23936
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23935
published_at 2026-04-18T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-21T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.2379
published_at 2026-04-24T12:55:00Z
14
value 0.00081
scoring_system epss
scoring_elements 0.23779
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4080
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
10
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
11
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
12
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
13
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
14
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
15
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6
16
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
17
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
18
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
24
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
25
reference_url http://www.securityfocus.com/bid/45058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45058
26
reference_url http://www.securityfocus.com/bid/45063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45063
27
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
28
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
29
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
30
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648669
reference_id 648669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648669
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4080
reference_id CVE-2010-4080
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4080
47
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
48
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
49
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
50
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
51
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
52
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
53
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
54
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
58
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4080
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x5t-fnw6-kqea
5
url VCID-643a-mvrh-bbap
vulnerability_id VCID-643a-mvrh-bbap
summary kernel: ipc/compat*.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/10/6/492
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/10/6/492
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4073
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49495
published_at 2026-04-29T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49475
published_at 2026-04-01T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49504
published_at 2026-04-02T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49531
published_at 2026-04-04T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49484
published_at 2026-04-07T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49539
published_at 2026-04-08T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49534
published_at 2026-04-09T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49552
published_at 2026-04-11T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49523
published_at 2026-04-12T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.49525
published_at 2026-04-13T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.49572
published_at 2026-04-16T12:55:00Z
11
value 0.00262
scoring_system epss
scoring_elements 0.49569
published_at 2026-04-18T12:55:00Z
12
value 0.00262
scoring_system epss
scoring_elements 0.4954
published_at 2026-04-26T12:55:00Z
13
value 0.00262
scoring_system epss
scoring_elements 0.4953
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4073
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
11
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
12
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
13
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
14
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
15
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
16
reference_url http://securityreason.com/securityalert/8366
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8366
17
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
18
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
21
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
22
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
27
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/45073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45073
29
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
30
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
31
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
32
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
33
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
34
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648658
reference_id 648658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648658
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4073
reference_id CVE-2010-4073
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4073
47
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
48
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
49
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
50
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
51
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
52
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
53
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
54
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1186-1/
reference_id USN-1186-1
reference_type
scores
url https://usn.ubuntu.com/1186-1/
58
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4073
risk_score 3.4
exploitability 2.0
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-643a-mvrh-bbap
6
url VCID-8fkd-5ked-xyes
vulnerability_id VCID-8fkd-5ked-xyes
summary kernel: prevent heap corruption in snd_ctl_new()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3442
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38744
published_at 2026-04-29T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.3897
published_at 2026-04-01T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39156
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39178
published_at 2026-04-16T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39152
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-12T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39125
published_at 2026-04-13T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39148
published_at 2026-04-18T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.3906
published_at 2026-04-21T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.3885
published_at 2026-04-24T12:55:00Z
13
value 0.00176
scoring_system epss
scoring_elements 0.38827
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3442
9
reference_url http://secunia.com/advisories/42400
reference_id
reference_type
scores
url http://secunia.com/advisories/42400
10
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
11
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
12
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
15
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
16
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
17
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
19
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/2
20
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/3
21
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/4
22
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/9
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0936.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0936.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
27
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/43787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43787
29
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
30
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
31
reference_url http://www.vupen.com/english/advisories/2010/3113
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3113
32
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
35
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
36
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638478
reference_id 638478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638478
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3442
reference_id CVE-2010-3442
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3442
60
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
61
reference_url https://access.redhat.com/errata/RHSA-2010:0936
reference_id RHSA-2010:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0936
62
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
63
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
64
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
65
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
66
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
67
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
68
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3442
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkd-5ked-xyes
7
url VCID-ashs-ew8u-qubr
vulnerability_id VCID-ashs-ew8u-qubr
summary kernel: perf bug
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://marc.info/?l=oss-security&m=128979684911295&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128979684911295&w=2
6
reference_url http://marc.info/?l=oss-security&m=128984344103497&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128984344103497&w=2
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4169.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4169.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4169
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14965
published_at 2026-04-29T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15107
published_at 2026-04-08T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15146
published_at 2026-04-02T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15215
published_at 2026-04-04T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15019
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15125
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15087
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15027
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14922
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14931
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.14984
published_at 2026-04-21T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15021
published_at 2026-04-24T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15023
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4169
9
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
10
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
11
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/63316
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/63316
13
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
15
reference_url http://www.securityfocus.com/bid/44861
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44861
16
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
17
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
18
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
19
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651671
reference_id 651671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651671
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4169
reference_id CVE-2010-4169
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4169
30
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
31
reference_url https://access.redhat.com/errata/RHSA-2011:0283
reference_id RHSA-2011:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0283
32
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
33
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
34
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
35
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
36
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
37
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
38
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4169
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ashs-ew8u-qubr
8
url VCID-f744-pabt-7ffu
vulnerability_id VCID-f744-pabt-7ffu
summary kernel: socket filters infoleak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4158
reference_id
reference_type
scores
0
value 0.00199
scoring_system epss
scoring_elements 0.41788
published_at 2026-04-29T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.41939
published_at 2026-04-01T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.42
published_at 2026-04-02T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.42028
published_at 2026-04-04T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.41954
published_at 2026-04-07T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.42005
published_at 2026-04-08T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.42016
published_at 2026-04-09T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.42038
published_at 2026-04-11T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42001
published_at 2026-04-12T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.41987
published_at 2026-04-13T12:55:00Z
10
value 0.00199
scoring_system epss
scoring_elements 0.42035
published_at 2026-04-16T12:55:00Z
11
value 0.00199
scoring_system epss
scoring_elements 0.42009
published_at 2026-04-18T12:55:00Z
12
value 0.00199
scoring_system epss
scoring_elements 0.41938
published_at 2026-04-21T12:55:00Z
13
value 0.00199
scoring_system epss
scoring_elements 0.41878
published_at 2026-04-24T12:55:00Z
14
value 0.00199
scoring_system epss
scoring_elements 0.4187
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4158
11
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
12
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
15
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
16
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
17
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
18
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
19
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
20
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
26
reference_url http://www.securityfocus.com/archive/1/514705
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514705
27
reference_url http://www.securityfocus.com/archive/1/514845
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514845
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/44758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44758
30
reference_url http://www.spinics.net/lists/netdev/msg146361.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg146361.html
31
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
32
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
35
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
36
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
37
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651698
reference_id 651698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651698
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4158
reference_id CVE-2010-4158
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4158
51
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c
reference_id CVE-2010-4158;OSVDB-69190
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c
52
reference_url https://www.securityfocus.com/bid/44758/info
reference_id CVE-2010-4158;OSVDB-69190
reference_type exploit
scores
url https://www.securityfocus.com/bid/44758/info
53
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
54
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
55
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
56
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
57
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
58
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
59
reference_url https://usn.ubuntu.com/1086-1/
reference_id USN-1086-1
reference_type
scores
url https://usn.ubuntu.com/1086-1/
60
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
61
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
62
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
63
reference_url https://usn.ubuntu.com/1105-1/
reference_id USN-1105-1
reference_type
scores
url https://usn.ubuntu.com/1105-1/
64
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
65
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
fixed_packages
aliases CVE-2010-4158
risk_score 3.8
exploitability 2.0
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f744-pabt-7ffu
9
url VCID-fjh9-4gn3-6feg
vulnerability_id VCID-fjh9-4gn3-6feg
summary kernel: sctp memory corruption in HMAC handling
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://marc.info/?l=linux-kernel&m=128596992418814&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-kernel&m=128596992418814&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3705.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3705.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3705
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.79102
published_at 2026-04-29T12:55:00Z
1
value 0.01215
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-01T12:55:00Z
2
value 0.01215
scoring_system epss
scoring_elements 0.78985
published_at 2026-04-02T12:55:00Z
3
value 0.01215
scoring_system epss
scoring_elements 0.79011
published_at 2026-04-04T12:55:00Z
4
value 0.01215
scoring_system epss
scoring_elements 0.78996
published_at 2026-04-07T12:55:00Z
5
value 0.01215
scoring_system epss
scoring_elements 0.7902
published_at 2026-04-08T12:55:00Z
6
value 0.01215
scoring_system epss
scoring_elements 0.79027
published_at 2026-04-09T12:55:00Z
7
value 0.01215
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-11T12:55:00Z
8
value 0.01215
scoring_system epss
scoring_elements 0.79035
published_at 2026-04-12T12:55:00Z
9
value 0.01215
scoring_system epss
scoring_elements 0.79025
published_at 2026-04-13T12:55:00Z
10
value 0.01215
scoring_system epss
scoring_elements 0.79053
published_at 2026-04-16T12:55:00Z
11
value 0.01215
scoring_system epss
scoring_elements 0.7905
published_at 2026-04-18T12:55:00Z
12
value 0.01215
scoring_system epss
scoring_elements 0.79048
published_at 2026-04-21T12:55:00Z
13
value 0.01215
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-24T12:55:00Z
14
value 0.01215
scoring_system epss
scoring_elements 0.79088
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3705
5
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
6
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
9
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/2
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/7
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
13
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
14
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=640036
reference_id 640036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=640036
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3705
reference_id CVE-2010-3705
reference_type
scores
0
value 8.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3705
26
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
27
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
28
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
29
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
30
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
31
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-3705
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjh9-4gn3-6feg
10
url VCID-j49x-d5sv-wkek
vulnerability_id VCID-j49x-d5sv-wkek
summary kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=405707985594169cfd0b1d97d29fcb4b4c6f2ac9
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=405707985594169cfd0b1d97d29fcb4b4c6f2ac9
1
reference_url http://lkml.org/lkml/2010/9/15/393
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/15/393
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4079.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4079.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4079
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-29T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22622
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22796
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22839
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22629
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22704
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22754
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22776
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22739
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22681
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22698
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22695
published_at 2026-04-18T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22647
published_at 2026-04-21T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22492
published_at 2026-04-24T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4079
4
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
5
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc8
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc8
7
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
8
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
9
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.securityfocus.com/bid/45062
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45062
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648666
reference_id 648666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648666
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4079
reference_id CVE-2010-4079
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4079
26
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
27
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
28
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
29
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
30
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
31
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
32
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
33
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
34
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
35
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
36
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-4079
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j49x-d5sv-wkek
11
url VCID-m6hm-2cau-4fdg
vulnerability_id VCID-m6hm-2cau-4fdg
summary kernel: net/packet/af_packet.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
1
reference_url http://marc.info/?l=linux-netdev&m=128854507220908&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128854507220908&w=2
2
reference_url http://openwall.com/lists/oss-security/2010/11/02/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/10
3
reference_url http://openwall.com/lists/oss-security/2010/11/02/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/12
4
reference_url http://openwall.com/lists/oss-security/2010/11/02/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/7
5
reference_url http://openwall.com/lists/oss-security/2010/11/02/9
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/02/9
6
reference_url http://openwall.com/lists/oss-security/2010/11/04/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/04/5
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3876
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.17869
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.1806
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18221
published_at 2026-04-02T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18274
published_at 2026-04-04T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.17975
published_at 2026-04-07T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18061
published_at 2026-04-08T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18122
published_at 2026-04-09T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-11T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-12T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18037
published_at 2026-04-13T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-04-16T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-18T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18021
published_at 2026-04-21T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-24T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.17904
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3876
9
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
12
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
13
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/44630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44630
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
23
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=649715
reference_id 649715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=649715
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3876
reference_id CVE-2010-3876
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3876
37
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
38
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
39
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
40
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
41
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
42
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
43
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
44
reference_url https://usn.ubuntu.com/1080-1/
reference_id USN-1080-1
reference_type
scores
url https://usn.ubuntu.com/1080-1/
45
reference_url https://usn.ubuntu.com/1080-2/
reference_id USN-1080-2
reference_type
scores
url https://usn.ubuntu.com/1080-2/
46
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
47
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
48
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
49
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
50
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-3876
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6hm-2cau-4fdg
12
url VCID-nej4-chcw-fqah
vulnerability_id VCID-nej4-chcw-fqah
summary kernel: ipc/sem.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4083
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.2475
published_at 2026-04-29T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24954
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25032
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25071
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24846
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24914
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24961
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24976
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24936
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24881
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24894
published_at 2026-04-16T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-18T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24865
published_at 2026-04-21T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24809
published_at 2026-04-24T12:55:00Z
14
value 0.00087
scoring_system epss
scoring_elements 0.24796
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4083
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
12
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
13
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
14
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
15
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
16
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
18
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
19
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
20
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
21
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
26
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
27
reference_url http://www.securityfocus.com/bid/43809
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43809
28
reference_url http://www.spinics.net/lists/mm-commits/msg80234.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/mm-commits/msg80234.html
29
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
30
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
31
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
32
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
33
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
34
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
35
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648673
reference_id 648673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648673
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4083
reference_id CVE-2010-4083
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4083
48
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
49
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
50
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
51
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
52
reference_url https://usn.ubuntu.com/1054-1/
reference_id USN-1054-1
reference_type
scores
url https://usn.ubuntu.com/1054-1/
53
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
54
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
55
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
56
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
57
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
58
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
59
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
60
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4083
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nej4-chcw-fqah
13
url VCID-nq55-xn3b-8qdm
vulnerability_id VCID-nq55-xn3b-8qdm
summary kernel: ipc/shm.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
6
reference_url http://lkml.org/lkml/2010/10/6/454
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/10/6/454
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4072
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.2133
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21493
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21663
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21721
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21474
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21551
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.2161
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21622
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21585
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21528
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21525
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21533
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21501
published_at 2026-04-21T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21355
published_at 2026-04-24T12:55:00Z
14
value 0.0007
scoring_system epss
scoring_elements 0.21352
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4072
9
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
10
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
11
reference_url http://secunia.com/advisories/42884
reference_id
reference_type
scores
url http://secunia.com/advisories/42884
12
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
13
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
14
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
15
reference_url http://secunia.com/advisories/43161
reference_id
reference_type
scores
url http://secunia.com/advisories/43161
16
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
17
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
18
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
19
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
22
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
23
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0017.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0017.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/45054
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45054
30
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
31
reference_url http://www.ubuntu.com/usn/USN-1057-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1057-1
32
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
35
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
36
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
37
reference_url http://www.vupen.com/english/advisories/2011/0280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0280
38
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
39
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648656
reference_id 648656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648656
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4072
reference_id CVE-2010-4072
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4072
57
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
58
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
59
reference_url https://access.redhat.com/errata/RHSA-2011:0017
reference_id RHSA-2011:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0017
60
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
61
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
62
reference_url https://usn.ubuntu.com/1057-1/
reference_id USN-1057-1
reference_type
scores
url https://usn.ubuntu.com/1057-1/
63
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
64
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
65
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
66
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
67
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
68
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-4072
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nq55-xn3b-8qdm
14
url VCID-pmch-au5t-2fh5
vulnerability_id VCID-pmch-au5t-2fh5
summary kernel: arbitrary kernel memory write via i915 GEM ioctl
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2962.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2962.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2962
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.29931
published_at 2026-04-29T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30337
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30367
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30415
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.3023
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.3029
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30325
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30328
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30284
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30237
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30252
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30234
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30189
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-24T12:55:00Z
14
value 0.00116
scoring_system epss
scoring_elements 0.3001
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2962
7
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
8
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
12
reference_url http://www.securityfocus.com/bid/44067
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44067
13
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
14
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
15
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
16
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=637688
reference_id 637688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=637688
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2962
reference_id CVE-2010-2962
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-2962
28
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
29
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
30
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
31
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
32
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
33
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
34
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
35
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-2962
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmch-au5t-2fh5
15
url VCID-pqms-kbb2-wua8
vulnerability_id VCID-pqms-kbb2-wua8
summary kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03392.html
reference_id
reference_type
scores
url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03392.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4082.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4082.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4082
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21136
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21296
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21452
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21506
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21258
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21338
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21399
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21408
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21368
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21314
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21318
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21293
published_at 2026-04-21T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21158
published_at 2026-04-24T12:55:00Z
14
value 0.0007
scoring_system epss
scoring_elements 0.21161
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4082
8
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
9
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
10
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
11
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5
13
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
14
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
15
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
16
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
17
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
19
reference_url http://www.securityfocus.com/bid/43817
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43817
20
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
21
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
22
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648671
reference_id 648671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648671
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4082
reference_id CVE-2010-4082
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4082
36
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
37
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
38
reference_url https://usn.ubuntu.com/1023-1/
reference_id USN-1023-1
reference_type
scores
url https://usn.ubuntu.com/1023-1/
39
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
40
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
41
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
42
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
43
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4082
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqms-kbb2-wua8
16
url VCID-rdyv-juby-e3gq
vulnerability_id VCID-rdyv-juby-e3gq
summary kernel: drivers/char/nozomi.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862
1
reference_url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
reference_id
reference_type
scores
url http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4077.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4077
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.65198
published_at 2026-04-29T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.65059
published_at 2026-04-01T12:55:00Z
2
value 0.00482
scoring_system epss
scoring_elements 0.65109
published_at 2026-04-02T12:55:00Z
3
value 0.00482
scoring_system epss
scoring_elements 0.65136
published_at 2026-04-04T12:55:00Z
4
value 0.00482
scoring_system epss
scoring_elements 0.65102
published_at 2026-04-07T12:55:00Z
5
value 0.00482
scoring_system epss
scoring_elements 0.65151
published_at 2026-04-08T12:55:00Z
6
value 0.00482
scoring_system epss
scoring_elements 0.65165
published_at 2026-04-09T12:55:00Z
7
value 0.00482
scoring_system epss
scoring_elements 0.65183
published_at 2026-04-11T12:55:00Z
8
value 0.00482
scoring_system epss
scoring_elements 0.65171
published_at 2026-04-12T12:55:00Z
9
value 0.00482
scoring_system epss
scoring_elements 0.65144
published_at 2026-04-13T12:55:00Z
10
value 0.00482
scoring_system epss
scoring_elements 0.65179
published_at 2026-04-16T12:55:00Z
11
value 0.00482
scoring_system epss
scoring_elements 0.65189
published_at 2026-04-18T12:55:00Z
12
value 0.00482
scoring_system epss
scoring_elements 0.65173
published_at 2026-04-21T12:55:00Z
13
value 0.00482
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-24T12:55:00Z
14
value 0.00482
scoring_system epss
scoring_elements 0.652
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4077
4
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
5
reference_url http://securityreason.com/securityalert/8129
reference_id
reference_type
scores
url http://securityreason.com/securityalert/8129
6
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
7
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
8
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
9
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
12
reference_url http://www.securityfocus.com/bid/45059
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45059
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648663
reference_id 648663
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648663
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16973.c
reference_id CVE-2010-4077
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16973.c
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4077
reference_id CVE-2010-4077
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4077
17
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
18
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
19
reference_url https://usn.ubuntu.com/1089-1/
reference_id USN-1089-1
reference_type
scores
url https://usn.ubuntu.com/1089-1/
20
reference_url https://usn.ubuntu.com/1092-1/
reference_id USN-1092-1
reference_type
scores
url https://usn.ubuntu.com/1092-1/
21
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
22
reference_url https://usn.ubuntu.com/1183-1/
reference_id USN-1183-1
reference_type
scores
url https://usn.ubuntu.com/1183-1/
23
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
24
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
25
reference_url https://usn.ubuntu.com/1203-1/
reference_id USN-1203-1
reference_type
scores
url https://usn.ubuntu.com/1203-1/
26
reference_url https://usn.ubuntu.com/1204-1/
reference_id USN-1204-1
reference_type
scores
url https://usn.ubuntu.com/1204-1/
27
reference_url https://usn.ubuntu.com/1208-1/
reference_id USN-1208-1
reference_type
scores
url https://usn.ubuntu.com/1208-1/
28
reference_url https://usn.ubuntu.com/1216-1/
reference_id USN-1216-1
reference_type
scores
url https://usn.ubuntu.com/1216-1/
29
reference_url https://usn.ubuntu.com/1218-1/
reference_id USN-1218-1
reference_type
scores
url https://usn.ubuntu.com/1218-1/
fixed_packages
aliases CVE-2010-4077
risk_score 3.4
exploitability 2.0
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rdyv-juby-e3gq
17
url VCID-t5zj-36y8-bbdt
vulnerability_id VCID-t5zj-36y8-bbdt
summary kernel: setup_arg_pages: diagnose excessive argument size
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583
1
reference_url http://grsecurity.net/~spender/64bit_dos.c
reference_id
reference_type
scores
url http://grsecurity.net/~spender/64bit_dos.c
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3858.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3858.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3858
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.34909
published_at 2026-04-29T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35159
published_at 2026-04-01T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35359
published_at 2026-04-02T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35386
published_at 2026-04-04T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35268
published_at 2026-04-07T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35314
published_at 2026-04-08T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35339
published_at 2026-04-09T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35341
published_at 2026-04-11T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35304
published_at 2026-04-12T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35281
published_at 2026-04-13T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.3532
published_at 2026-04-16T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35307
published_at 2026-04-18T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.35254
published_at 2026-04-21T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-24T12:55:00Z
14
value 0.00148
scoring_system epss
scoring_elements 0.34999
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3858
4
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
5
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
6
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
7
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
8
reference_url http://www.exploit-db.com/exploits/15619
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15619
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
11
reference_url http://www.openwall.com/lists/oss-security/2010/10/21/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/21/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/10/22/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/22/4
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/44301
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44301
17
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
18
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
19
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
20
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645222
reference_id 645222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645222
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3858
reference_id CVE-2010-3858
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3858
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15619.c
reference_id CVE-2010-4243;OSVDB-70659;CVE-2010-3858;OSVDB-69551
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15619.c
29
reference_url https://www.securityfocus.com/bid/44301/info
reference_id CVE-2010-4243;OSVDB-70659;CVE-2010-3858;OSVDB-69551
reference_type exploit
scores
url https://www.securityfocus.com/bid/44301/info
30
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
31
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
32
reference_url https://access.redhat.com/errata/RHSA-2011:0836
reference_id RHSA-2011:0836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0836
33
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
34
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
35
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
36
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
37
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
38
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
39
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-3858
risk_score 8.8
exploitability 2.0
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5zj-36y8-bbdt
18
url VCID-v5g5-3pv6-dqa4
vulnerability_id VCID-v5g5-3pv6-dqa4
summary kernel: gdth: integer overflow in ioc_general()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
8
reference_url http://ns3.spinics.net/lists/linux-scsi/msg47361.html
reference_id
reference_type
scores
url http://ns3.spinics.net/lists/linux-scsi/msg47361.html
9
reference_url http://openwall.com/lists/oss-security/2010/11/09/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/1
10
reference_url http://openwall.com/lists/oss-security/2010/11/09/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/3
11
reference_url http://openwall.com/lists/oss-security/2010/11/09/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/4
12
reference_url http://openwall.com/lists/oss-security/2010/11/09/5
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/09/5
13
reference_url http://openwall.com/lists/oss-security/2010/11/10/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/11/10/12
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4157
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29439
published_at 2026-04-29T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29824
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29917
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29733
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29795
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.2983
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29839
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29794
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29743
published_at 2026-04-13T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29761
published_at 2026-04-16T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29739
published_at 2026-04-18T12:55:00Z
12
value 0.00112
scoring_system epss
scoring_elements 0.29695
published_at 2026-04-21T12:55:00Z
13
value 0.00112
scoring_system epss
scoring_elements 0.29615
published_at 2026-04-24T12:55:00Z
14
value 0.00112
scoring_system epss
scoring_elements 0.29501
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4157
16
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
17
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
18
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
19
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
20
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
21
reference_url http://secunia.com/advisories/42963
reference_id
reference_type
scores
url http://secunia.com/advisories/42963
22
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
23
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
24
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1
25
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2011-0162.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0162.html
28
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
29
reference_url http://www.securityfocus.com/bid/44648
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44648
30
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
31
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
32
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
33
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
34
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
35
reference_url http://www.vupen.com/english/advisories/2011/0168
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0168
36
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
37
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=651147
reference_id 651147
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=651147
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4157
reference_id CVE-2010-4157
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4157
51
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
52
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
53
reference_url https://access.redhat.com/errata/RHSA-2011:0162
reference_id RHSA-2011:0162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0162
54
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
55
reference_url https://usn.ubuntu.com/1071-1/
reference_id USN-1071-1
reference_type
scores
url https://usn.ubuntu.com/1071-1/
56
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
57
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
58
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
59
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
60
reference_url https://usn.ubuntu.com/1164-1/
reference_id USN-1164-1
reference_type
scores
url https://usn.ubuntu.com/1164-1/
61
reference_url https://usn.ubuntu.com/1202-1/
reference_id USN-1202-1
reference_type
scores
url https://usn.ubuntu.com/1202-1/
fixed_packages
aliases CVE-2010-4157
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5g5-3pv6-dqa4
19
url VCID-vwj3-5b6z-17b1
vulnerability_id VCID-vwj3-5b6z-17b1
summary kernel: sctp: do not reset the packet during sctp_packet_config
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url http://marc.info/?l=linux-netdev&m=128453869227715&w=3
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128453869227715&w=3
4
reference_url http://marc.info/?l=oss-security&m=128534569803598&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128534569803598&w=2
5
reference_url http://marc.info/?l=oss-security&m=128537701808336&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128537701808336&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3432
reference_id
reference_type
scores
0
value 0.04322
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-29T12:55:00Z
1
value 0.04322
scoring_system epss
scoring_elements 0.88856
published_at 2026-04-01T12:55:00Z
2
value 0.04322
scoring_system epss
scoring_elements 0.88865
published_at 2026-04-02T12:55:00Z
3
value 0.04322
scoring_system epss
scoring_elements 0.8888
published_at 2026-04-04T12:55:00Z
4
value 0.04322
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-07T12:55:00Z
5
value 0.04322
scoring_system epss
scoring_elements 0.889
published_at 2026-04-08T12:55:00Z
6
value 0.04322
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-09T12:55:00Z
7
value 0.04322
scoring_system epss
scoring_elements 0.88917
published_at 2026-04-11T12:55:00Z
8
value 0.04322
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-12T12:55:00Z
9
value 0.04322
scoring_system epss
scoring_elements 0.88911
published_at 2026-04-13T12:55:00Z
10
value 0.04322
scoring_system epss
scoring_elements 0.88925
published_at 2026-04-16T12:55:00Z
11
value 0.04322
scoring_system epss
scoring_elements 0.88923
published_at 2026-04-18T12:55:00Z
12
value 0.04322
scoring_system epss
scoring_elements 0.8892
published_at 2026-04-21T12:55:00Z
13
value 0.04322
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3432
8
reference_url http://secunia.com/advisories/42400
reference_id
reference_type
scores
url http://secunia.com/advisories/42400
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
11
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
12
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
13
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0936.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0936.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
18
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/43480
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43480
20
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2010/3113
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3113
23
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
24
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
25
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=637675
reference_id 637675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=637675
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3432
reference_id CVE-2010-3432
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3432
38
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
39
reference_url https://access.redhat.com/errata/RHSA-2010:0936
reference_id RHSA-2010:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0936
40
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
41
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
42
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
43
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
44
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
45
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
46
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3432
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwj3-5b6z-17b1
20
url VCID-zwvt-5gfz-suda
vulnerability_id VCID-zwvt-5gfz-suda
summary kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a0846f1868b11cd827bdfeaf4527d8b1b1c0b098
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a0846f1868b11cd827bdfeaf4527d8b1b1c0b098
1
reference_url http://lkml.org/lkml/2010/9/15/392
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/15/392
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4074.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4074.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4074
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22481
published_at 2026-04-29T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22622
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22796
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22839
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22629
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22704
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22754
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22776
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22739
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22681
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22698
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22695
published_at 2026-04-18T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22647
published_at 2026-04-21T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22492
published_at 2026-04-24T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4074
4
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
5
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5
7
reference_url http://www.openwall.com/lists/oss-security/2010/09/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/25/2
8
reference_url http://www.openwall.com/lists/oss-security/2010/10/06/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/06/6
9
reference_url http://www.openwall.com/lists/oss-security/2010/10/07/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/07/1
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/25/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/25/3
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.securityfocus.com/bid/45074
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45074
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=648659
reference_id 648659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=648659
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4074
reference_id CVE-2010-4074
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4074
23
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
24
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
25
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
26
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
27
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
28
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
fixed_packages
aliases CVE-2010-4074
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zwvt-5gfz-suda
Fixing_vulnerabilities
Risk_score8.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47%3Farch=el5rt