Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@2.6.32-71.7.1?arch=el6
Typerpm
Namespaceredhat
Namekernel
Version2.6.32-71.7.1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-229q-sxf7-8bgu
vulnerability_id VCID-229q-sxf7-8bgu
summary kernel: wireless: fix 64K kernel heap content leak via ioctl
references
0
reference_url http://forums.grsecurity.net/viewtopic.php?f=3&t=2290
reference_id
reference_type
scores
url http://forums.grsecurity.net/viewtopic.php?f=3&t=2290
1
reference_url http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4
2
reference_url http://grsecurity.net/~spender/wireless-infoleak-fix2.patch
reference_id
reference_type
scores
url http://grsecurity.net/~spender/wireless-infoleak-fix2.patch
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url http://lkml.org/lkml/2010/8/27/413
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/27/413
6
reference_url http://lkml.org/lkml/2010/8/30/127
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/30/127
7
reference_url http://lkml.org/lkml/2010/8/30/146
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/30/146
8
reference_url http://lkml.org/lkml/2010/8/30/351
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/8/30/351
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2955.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2955.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2955
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26237
published_at 2026-04-29T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26522
published_at 2026-04-09T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26575
published_at 2026-04-02T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26619
published_at 2026-04-04T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26404
published_at 2026-04-07T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-08T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26529
published_at 2026-04-11T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26483
published_at 2026-04-12T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26425
published_at 2026-04-13T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26431
published_at 2026-04-16T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26402
published_at 2026-04-18T12:55:00Z
11
value 0.00095
scoring_system epss
scoring_elements 0.26366
published_at 2026-04-21T12:55:00Z
12
value 0.00095
scoring_system epss
scoring_elements 0.26296
published_at 2026-04-24T12:55:00Z
13
value 0.00095
scoring_system epss
scoring_elements 0.26288
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2955
11
reference_url http://secunia.com/advisories/41245
reference_id
reference_type
scores
url http://secunia.com/advisories/41245
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2
13
reference_url http://www.openwall.com/lists/oss-security/2010/08/31/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/31/1
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0771.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0771.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
16
reference_url http://www.securityfocus.com/bid/42885
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42885
17
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
18
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=628434
reference_id 628434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=628434
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2955
reference_id CVE-2010-2955
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-2955
35
reference_url https://access.redhat.com/errata/RHSA-2010:0771
reference_id RHSA-2010:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0771
36
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
37
reference_url https://usn.ubuntu.com/1023-1/
reference_id USN-1023-1
reference_type
scores
url https://usn.ubuntu.com/1023-1/
38
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
39
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
40
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
41
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
42
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-2955
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-229q-sxf7-8bgu
1
url VCID-3vwf-bjs1-6bg9
vulnerability_id VCID-3vwf-bjs1-6bg9
summary kernel: 64-bit Compatibility Mode Stack Pointer Underflow
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html
1
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html
2
reference_url http://blog.ksplice.com/2010/09/cve-2010-3081/
reference_id
reference_type
scores
url http://blog.ksplice.com/2010/09/cve-2010-3081/
3
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6
4
reference_url http://isc.sans.edu/diary.html?storyid=9574
reference_id
reference_type
scores
url http://isc.sans.edu/diary.html?storyid=9574
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
8
reference_url http://marc.info/?l=oss-security&m=128461522230211&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128461522230211&w=2
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3081.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3081.json
10
reference_url https://access.redhat.com/kb/docs/DOC-40265
reference_id
reference_type
scores
url https://access.redhat.com/kb/docs/DOC-40265
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3081
reference_id
reference_type
scores
0
value 0.07253
scoring_system epss
scoring_elements 0.91649
published_at 2026-04-29T12:55:00Z
1
value 0.07253
scoring_system epss
scoring_elements 0.91652
published_at 2026-04-26T12:55:00Z
2
value 0.07253
scoring_system epss
scoring_elements 0.91591
published_at 2026-04-01T12:55:00Z
3
value 0.07253
scoring_system epss
scoring_elements 0.91598
published_at 2026-04-02T12:55:00Z
4
value 0.07253
scoring_system epss
scoring_elements 0.91604
published_at 2026-04-04T12:55:00Z
5
value 0.07253
scoring_system epss
scoring_elements 0.91612
published_at 2026-04-07T12:55:00Z
6
value 0.07253
scoring_system epss
scoring_elements 0.91625
published_at 2026-04-08T12:55:00Z
7
value 0.07253
scoring_system epss
scoring_elements 0.91631
published_at 2026-04-09T12:55:00Z
8
value 0.07253
scoring_system epss
scoring_elements 0.91635
published_at 2026-04-11T12:55:00Z
9
value 0.07253
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-12T12:55:00Z
10
value 0.07253
scoring_system epss
scoring_elements 0.91634
published_at 2026-04-13T12:55:00Z
11
value 0.07253
scoring_system epss
scoring_elements 0.91655
published_at 2026-04-16T12:55:00Z
12
value 0.07253
scoring_system epss
scoring_elements 0.91647
published_at 2026-04-21T12:55:00Z
13
value 0.07253
scoring_system epss
scoring_elements 0.91654
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3081
12
reference_url http://secunia.com/advisories/42384
reference_id
reference_type
scores
url http://secunia.com/advisories/42384
13
reference_url http://secunia.com/advisories/43315
reference_id
reference_type
scores
url http://secunia.com/advisories/43315
14
reference_url http://sota.gen.nz/compat1/
reference_id
reference_type
scores
url http://sota.gen.nz/compat1/
15
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:214
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0758.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0758.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2010-0882.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0882.html
22
reference_url http://www.securityfocus.com/archive/1/514938/30/30/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514938/30/30/threaded
23
reference_url http://www.securityfocus.com/archive/1/516397/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/516397/100/0/threaded
24
reference_url http://www.vmware.com/security/advisories/VMSA-2010-0017.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2010-0017.html
25
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0003.html
26
reference_url http://www.vupen.com/english/advisories/2010/3083
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3083
27
reference_url http://www.vupen.com/english/advisories/2010/3117
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3117
28
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=634457
reference_id 634457
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=634457
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3081
reference_id CVE-2010-3081
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-3081
40
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15024.c
reference_id CVE-2010-3081;OSVDB-68213
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15024.c
41
reference_url https://access.redhat.com/errata/RHSA-2010:0704
reference_id RHSA-2010:0704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0704
42
reference_url https://access.redhat.com/errata/RHSA-2010:0705
reference_id RHSA-2010:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0705
43
reference_url https://access.redhat.com/errata/RHSA-2010:0711
reference_id RHSA-2010:0711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0711
44
reference_url https://access.redhat.com/errata/RHSA-2010:0718
reference_id RHSA-2010:0718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0718
45
reference_url https://access.redhat.com/errata/RHSA-2010:0719
reference_id RHSA-2010:0719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0719
46
reference_url https://access.redhat.com/errata/RHSA-2010:0758
reference_id RHSA-2010:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0758
47
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
48
reference_url https://access.redhat.com/errata/RHSA-2010:0882
reference_id RHSA-2010:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0882
49
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
50
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
51
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
52
reference_url https://usn.ubuntu.com/988-1/
reference_id USN-988-1
reference_type
scores
url https://usn.ubuntu.com/988-1/
fixed_packages
aliases CVE-2010-3081
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vwf-bjs1-6bg9
2
url VCID-4k1s-fghb-p3bb
vulnerability_id VCID-4k1s-fghb-p3bb
summary kernel: IA32 System Call Entry Point Vulnerability
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=36d001c70d8a0144ac1d038f6876c484849a74de
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=36d001c70d8a0144ac1d038f6876c484849a74de
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eefdca043e8391dcd719711716492063030b55ac
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eefdca043e8391dcd719711716492063030b55ac
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3301.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3301.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3301
reference_id
reference_type
scores
0
value 0.06169
scoring_system epss
scoring_elements 0.90784
published_at 2026-04-01T12:55:00Z
1
value 0.06169
scoring_system epss
scoring_elements 0.9079
published_at 2026-04-02T12:55:00Z
2
value 0.06169
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-04T12:55:00Z
3
value 0.06169
scoring_system epss
scoring_elements 0.90812
published_at 2026-04-07T12:55:00Z
4
value 0.06169
scoring_system epss
scoring_elements 0.90823
published_at 2026-04-08T12:55:00Z
5
value 0.06169
scoring_system epss
scoring_elements 0.9083
published_at 2026-04-09T12:55:00Z
6
value 0.06169
scoring_system epss
scoring_elements 0.90838
published_at 2026-04-11T12:55:00Z
7
value 0.06614
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-18T12:55:00Z
8
value 0.06614
scoring_system epss
scoring_elements 0.9122
published_at 2026-04-26T12:55:00Z
9
value 0.06614
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-13T12:55:00Z
10
value 0.06614
scoring_system epss
scoring_elements 0.91219
published_at 2026-04-29T12:55:00Z
11
value 0.06614
scoring_system epss
scoring_elements 0.91209
published_at 2026-04-21T12:55:00Z
12
value 0.06614
scoring_system epss
scoring_elements 0.91221
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3301
6
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
7
reference_url http://sota.gen.nz/compat2/
reference_id
reference_type
scores
url http://sota.gen.nz/compat2/
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
11
reference_url http://www.openwall.com/lists/oss-security/2010/09/16/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/16/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/09/16/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/16/3
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
14
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
15
reference_url http://www.vupen.com/english/advisories/2010/3117
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3117
16
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
17
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=634449
reference_id 634449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=634449
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3301
reference_id CVE-2010-3301
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3301
29
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15023.c
reference_id CVE-2010-3301;OSVDB-68192
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15023.c
30
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
31
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
32
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
33
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
34
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
35
reference_url https://usn.ubuntu.com/988-1/
reference_id USN-988-1
reference_type
scores
url https://usn.ubuntu.com/988-1/
fixed_packages
aliases CVE-2010-3301
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k1s-fghb-p3bb
3
url VCID-5dmd-zwje-pqek
vulnerability_id VCID-5dmd-zwje-pqek
summary kernel: pktcdvd ioctl dev_minor missing range check
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
1
reference_url http://jon.oberheide.org/files/cve-2010-3437.c
reference_id
reference_type
scores
url http://jon.oberheide.org/files/cve-2010-3437.c
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3437.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3437.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3437
reference_id
reference_type
scores
0
value 0.01729
scoring_system epss
scoring_elements 0.82401
published_at 2026-04-07T12:55:00Z
1
value 0.01828
scoring_system epss
scoring_elements 0.82975
published_at 2026-04-29T12:55:00Z
2
value 0.01828
scoring_system epss
scoring_elements 0.8297
published_at 2026-04-26T12:55:00Z
3
value 0.01828
scoring_system epss
scoring_elements 0.8296
published_at 2026-04-24T12:55:00Z
4
value 0.01883
scoring_system epss
scoring_elements 0.83167
published_at 2026-04-11T12:55:00Z
5
value 0.01883
scoring_system epss
scoring_elements 0.83143
published_at 2026-04-08T12:55:00Z
6
value 0.01883
scoring_system epss
scoring_elements 0.8315
published_at 2026-04-09T12:55:00Z
7
value 0.01883
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-12T12:55:00Z
8
value 0.01883
scoring_system epss
scoring_elements 0.83157
published_at 2026-04-13T12:55:00Z
9
value 0.01883
scoring_system epss
scoring_elements 0.83194
published_at 2026-04-18T12:55:00Z
10
value 0.01883
scoring_system epss
scoring_elements 0.83197
published_at 2026-04-21T12:55:00Z
11
value 0.02066
scoring_system epss
scoring_elements 0.83863
published_at 2026-04-01T12:55:00Z
12
value 0.02066
scoring_system epss
scoring_elements 0.83892
published_at 2026-04-04T12:55:00Z
13
value 0.02066
scoring_system epss
scoring_elements 0.83877
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3437
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
11
reference_url http://secunia.com/advisories/42932
reference_id
reference_type
scores
url http://secunia.com/advisories/42932
12
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
13
reference_url http://www.exploit-db.com/exploits/15150/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15150/
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
17
reference_url http://www.openwall.com/lists/oss-security/2010/09/28/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/28/2
18
reference_url http://www.openwall.com/lists/oss-security/2010/09/28/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/28/6
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
20
reference_url http://www.securityfocus.com/bid/43551
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43551
21
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
22
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
23
reference_url http://www.vupen.com/english/advisories/2011/0124
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0124
24
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638085
reference_id 638085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638085
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3437
reference_id CVE-2010-3437
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3437
50
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15150.c
reference_id CVE-2010-3437;OSVDB-68370
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15150.c
51
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
52
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
53
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
54
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
55
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
56
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
57
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-3437
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dmd-zwje-pqek
4
url VCID-8fkd-5ked-xyes
vulnerability_id VCID-8fkd-5ked-xyes
summary kernel: prevent heap corruption in snd_ctl_new()
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3442
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.38744
published_at 2026-04-29T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.3897
published_at 2026-04-01T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39156
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39178
published_at 2026-04-16T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39152
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.3918
published_at 2026-04-11T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39144
published_at 2026-04-12T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39125
published_at 2026-04-13T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39148
published_at 2026-04-18T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.3906
published_at 2026-04-21T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.3885
published_at 2026-04-24T12:55:00Z
13
value 0.00176
scoring_system epss
scoring_elements 0.38827
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3442
9
reference_url http://secunia.com/advisories/42400
reference_id
reference_type
scores
url http://secunia.com/advisories/42400
10
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
11
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
12
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
13
reference_url http://secunia.com/advisories/42801
reference_id
reference_type
scores
url http://secunia.com/advisories/42801
14
reference_url http://secunia.com/advisories/43291
reference_id
reference_type
scores
url http://secunia.com/advisories/43291
15
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
16
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
17
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
19
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/2
20
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/3
21
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/4
22
reference_url http://www.openwall.com/lists/oss-security/2010/09/29/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/29/9
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0936.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0936.html
25
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
26
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
27
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/43787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43787
29
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
30
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
31
reference_url http://www.vupen.com/english/advisories/2010/3113
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3113
32
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
33
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
34
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
35
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
36
reference_url http://www.vupen.com/english/advisories/2011/0375
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0375
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=638478
reference_id 638478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=638478
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3442
reference_id CVE-2010-3442
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3442
60
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
61
reference_url https://access.redhat.com/errata/RHSA-2010:0936
reference_id RHSA-2010:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0936
62
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
63
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
64
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
65
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
66
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
67
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
68
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3442
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkd-5ked-xyes
5
url VCID-fjh9-4gn3-6feg
vulnerability_id VCID-fjh9-4gn3-6feg
summary kernel: sctp memory corruption in HMAC handling
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://marc.info/?l=linux-kernel&m=128596992418814&w=2
reference_id
reference_type
scores
url http://marc.info/?l=linux-kernel&m=128596992418814&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3705.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3705.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3705
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.79102
published_at 2026-04-29T12:55:00Z
1
value 0.01215
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-01T12:55:00Z
2
value 0.01215
scoring_system epss
scoring_elements 0.78985
published_at 2026-04-02T12:55:00Z
3
value 0.01215
scoring_system epss
scoring_elements 0.79011
published_at 2026-04-04T12:55:00Z
4
value 0.01215
scoring_system epss
scoring_elements 0.78996
published_at 2026-04-07T12:55:00Z
5
value 0.01215
scoring_system epss
scoring_elements 0.7902
published_at 2026-04-08T12:55:00Z
6
value 0.01215
scoring_system epss
scoring_elements 0.79027
published_at 2026-04-09T12:55:00Z
7
value 0.01215
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-11T12:55:00Z
8
value 0.01215
scoring_system epss
scoring_elements 0.79035
published_at 2026-04-12T12:55:00Z
9
value 0.01215
scoring_system epss
scoring_elements 0.79025
published_at 2026-04-13T12:55:00Z
10
value 0.01215
scoring_system epss
scoring_elements 0.79053
published_at 2026-04-16T12:55:00Z
11
value 0.01215
scoring_system epss
scoring_elements 0.7905
published_at 2026-04-18T12:55:00Z
12
value 0.01215
scoring_system epss
scoring_elements 0.79048
published_at 2026-04-21T12:55:00Z
13
value 0.01215
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-24T12:55:00Z
14
value 0.01215
scoring_system epss
scoring_elements 0.79088
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3705
5
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
6
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
7
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
9
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/2
10
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/7
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
13
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
14
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=640036
reference_id 640036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=640036
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3705
reference_id CVE-2010-3705
reference_type
scores
0
value 8.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3705
26
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
27
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
28
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
29
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
30
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
31
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
32
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
33
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-3705
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjh9-4gn3-6feg
6
url VCID-nftw-r2j9-y7cp
vulnerability_id VCID-nftw-r2j9-y7cp
summary kernel: ftrace NULL ptr deref
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3079.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3079.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3079
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.30882
published_at 2026-04-29T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.30964
published_at 2026-04-26T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31266
published_at 2026-04-01T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31406
published_at 2026-04-02T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31448
published_at 2026-04-04T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31268
published_at 2026-04-07T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31321
published_at 2026-04-08T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31351
published_at 2026-04-09T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31355
published_at 2026-04-11T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31312
published_at 2026-04-12T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31273
published_at 2026-04-13T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31307
published_at 2026-04-16T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.31287
published_at 2026-04-18T12:55:00Z
13
value 0.00122
scoring_system epss
scoring_elements 0.31259
published_at 2026-04-21T12:55:00Z
14
value 0.00122
scoring_system epss
scoring_elements 0.31087
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3079
5
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
6
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5
7
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
8
reference_url http://www.securityfocus.com/bid/43684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43684
9
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
10
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
11
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=631623
reference_id 631623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=631623
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3079
reference_id CVE-2010-3079
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-3079
21
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
22
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
23
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
24
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
25
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
26
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
27
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-3079
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nftw-r2j9-y7cp
7
url VCID-pmch-au5t-2fh5
vulnerability_id VCID-pmch-au5t-2fh5
summary kernel: arbitrary kernel memory write via i915 GEM ioctl
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2962.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2962.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2962
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.29931
published_at 2026-04-29T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30337
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30367
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30415
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.3023
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.3029
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30325
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30328
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30284
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30237
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30252
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30234
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30189
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-24T12:55:00Z
14
value 0.00116
scoring_system epss
scoring_elements 0.3001
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2962
7
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
8
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
12
reference_url http://www.securityfocus.com/bid/44067
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44067
13
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
14
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
15
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
16
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=637688
reference_id 637688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=637688
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2962
reference_id CVE-2010-2962
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-2962
28
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
29
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
30
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
31
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
32
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
33
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
34
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
35
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-2962
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmch-au5t-2fh5
8
url VCID-qnqy-k1r2-ckf5
vulnerability_id VCID-qnqy-k1r2-ckf5
summary kernel: niu: buffer overflow for ETHTOOL_GRXCLSRLALL
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee9c5cfad29c8a13199962614b9b16f1c4137ac9
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee9c5cfad29c8a13199962614b9b16f1c4137ac9
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3084.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3084.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3084
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25438
published_at 2026-04-29T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25669
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25739
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.2578
published_at 2026-04-04T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.2555
published_at 2026-04-07T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25622
published_at 2026-04-08T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-09T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.2568
published_at 2026-04-11T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25639
published_at 2026-04-12T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25583
published_at 2026-04-13T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25584
published_at 2026-04-16T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25569
published_at 2026-04-18T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25541
published_at 2026-04-21T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25493
published_at 2026-04-24T12:55:00Z
14
value 0.00091
scoring_system epss
scoring_elements 0.25485
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3084
4
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
5
reference_url http://www.openwall.com/lists/oss-security/2010/09/09/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/09/1
6
reference_url http://www.openwall.com/lists/oss-security/2010/09/11/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/11/1
7
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
8
reference_url http://www.securityfocus.com/bid/43098
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43098
9
reference_url http://www.spinics.net/lists/netdev/msg140133.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/netdev/msg140133.html
10
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
11
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=632069
reference_id 632069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=632069
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3084
reference_id CVE-2010-3084
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3084
24
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
25
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
26
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
27
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
28
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
29
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3084
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnqy-k1r2-ckf5
9
url VCID-ux7d-jpk1-7ubt
vulnerability_id VCID-ux7d-jpk1-7ubt
summary kernel: drm ioctls infoleak
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
1
reference_url http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
2
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2803.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2803.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2803
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.238
published_at 2026-04-29T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24014
published_at 2026-04-01T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24141
published_at 2026-04-02T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24178
published_at 2026-04-04T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.23965
published_at 2026-04-07T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24032
published_at 2026-04-08T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24078
published_at 2026-04-09T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24095
published_at 2026-04-11T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24052
published_at 2026-04-12T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.23995
published_at 2026-04-13T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24007
published_at 2026-04-16T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.23994
published_at 2026-04-18T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.23976
published_at 2026-04-21T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.23853
published_at 2026-04-24T12:55:00Z
14
value 0.00082
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2803
9
reference_url http://secunia.com/advisories/41512
reference_id
reference_type
scores
url http://secunia.com/advisories/41512
10
reference_url http://www.debian.org/security/2010/dsa-2094
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2094
11
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.53
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.21
13
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34.6
14
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.4
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
17
reference_url http://www.vupen.com/english/advisories/2010/2430
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2430
18
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621435
reference_id 621435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621435
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2803
reference_id CVE-2010-2803
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-2803
29
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
30
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
31
reference_url https://usn.ubuntu.com/974-1/
reference_id USN-974-1
reference_type
scores
url https://usn.ubuntu.com/974-1/
fixed_packages
aliases CVE-2010-2803
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ux7d-jpk1-7ubt
10
url VCID-vwj3-5b6z-17b1
vulnerability_id VCID-vwj3-5b6z-17b1
summary kernel: sctp: do not reset the packet during sctp_packet_config
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url http://marc.info/?l=linux-netdev&m=128453869227715&w=3
reference_id
reference_type
scores
url http://marc.info/?l=linux-netdev&m=128453869227715&w=3
4
reference_url http://marc.info/?l=oss-security&m=128534569803598&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128534569803598&w=2
5
reference_url http://marc.info/?l=oss-security&m=128537701808336&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128537701808336&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3432
reference_id
reference_type
scores
0
value 0.04322
scoring_system epss
scoring_elements 0.88944
published_at 2026-04-29T12:55:00Z
1
value 0.04322
scoring_system epss
scoring_elements 0.88856
published_at 2026-04-01T12:55:00Z
2
value 0.04322
scoring_system epss
scoring_elements 0.88865
published_at 2026-04-02T12:55:00Z
3
value 0.04322
scoring_system epss
scoring_elements 0.8888
published_at 2026-04-04T12:55:00Z
4
value 0.04322
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-07T12:55:00Z
5
value 0.04322
scoring_system epss
scoring_elements 0.889
published_at 2026-04-08T12:55:00Z
6
value 0.04322
scoring_system epss
scoring_elements 0.88906
published_at 2026-04-09T12:55:00Z
7
value 0.04322
scoring_system epss
scoring_elements 0.88917
published_at 2026-04-11T12:55:00Z
8
value 0.04322
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-12T12:55:00Z
9
value 0.04322
scoring_system epss
scoring_elements 0.88911
published_at 2026-04-13T12:55:00Z
10
value 0.04322
scoring_system epss
scoring_elements 0.88925
published_at 2026-04-16T12:55:00Z
11
value 0.04322
scoring_system epss
scoring_elements 0.88923
published_at 2026-04-18T12:55:00Z
12
value 0.04322
scoring_system epss
scoring_elements 0.8892
published_at 2026-04-21T12:55:00Z
13
value 0.04322
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3432
8
reference_url http://secunia.com/advisories/42400
reference_id
reference_type
scores
url http://secunia.com/advisories/42400
9
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
10
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
11
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
12
reference_url http://www.debian.org/security/2010/dsa-2126
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2126
13
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0936.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0936.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0958.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0958.html
17
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
18
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/43480
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43480
20
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1000-1
21
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
22
reference_url http://www.vupen.com/english/advisories/2010/3113
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3113
23
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
24
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
25
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=637675
reference_id 637675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=637675
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3432
reference_id CVE-2010-3432
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3432
38
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
39
reference_url https://access.redhat.com/errata/RHSA-2010:0936
reference_id RHSA-2010:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0936
40
reference_url https://access.redhat.com/errata/RHSA-2010:0958
reference_id RHSA-2010:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0958
41
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
42
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
43
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
44
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
45
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
46
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
fixed_packages
aliases CVE-2010-3432
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwj3-5b6z-17b1
11
url VCID-xcnp-gudk-3fec
vulnerability_id VCID-xcnp-gudk-3fec
summary kernel: RDS sockets local privilege escalation
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
4
reference_url http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3904.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3904.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3904
reference_id
reference_type
scores
0
value 0.01254
scoring_system epss
scoring_elements 0.79395
published_at 2026-04-21T12:55:00Z
1
value 0.01254
scoring_system epss
scoring_elements 0.79392
published_at 2026-04-18T12:55:00Z
2
value 0.01447
scoring_system epss
scoring_elements 0.80818
published_at 2026-04-26T12:55:00Z
3
value 0.01447
scoring_system epss
scoring_elements 0.80813
published_at 2026-04-24T12:55:00Z
4
value 0.01579
scoring_system epss
scoring_elements 0.815
published_at 2026-04-01T12:55:00Z
5
value 0.01579
scoring_system epss
scoring_elements 0.81512
published_at 2026-04-02T12:55:00Z
6
value 0.01579
scoring_system epss
scoring_elements 0.81602
published_at 2026-04-16T12:55:00Z
7
value 0.01579
scoring_system epss
scoring_elements 0.81572
published_at 2026-04-12T12:55:00Z
8
value 0.01579
scoring_system epss
scoring_elements 0.81585
published_at 2026-04-11T12:55:00Z
9
value 0.01579
scoring_system epss
scoring_elements 0.81565
published_at 2026-04-13T12:55:00Z
10
value 0.01579
scoring_system epss
scoring_elements 0.8156
published_at 2026-04-08T12:55:00Z
11
value 0.01579
scoring_system epss
scoring_elements 0.81531
published_at 2026-04-07T12:55:00Z
12
value 0.01579
scoring_system epss
scoring_elements 0.81533
published_at 2026-04-04T12:55:00Z
13
value 0.01618
scoring_system epss
scoring_elements 0.81893
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3904
7
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://secunia.com/advisories/46397
8
reference_url http://securitytracker.com/id?1024613
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://securitytracker.com/id?1024613
9
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-3904
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-3904
10
reference_url https://www.exploit-db.com/exploits/44677/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url https://www.exploit-db.com/exploits/44677/
11
reference_url http://www.kb.cert.org/vuls/id/362983
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.kb.cert.org/vuls/id/362983
12
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0792.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.redhat.com/support/errata/RHSA-2010-0792.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
15
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
16
reference_url http://www.ubuntu.com/usn/USN-1000-1
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.ubuntu.com/usn/USN-1000-1
17
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
18
reference_url http://www.vsecurity.com/download/tools/linux-rds-exploit.c
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.vsecurity.com/download/tools/linux-rds-exploit.c
19
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.vupen.com/english/advisories/2011/0298
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=642896
reference_id 642896
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=642896
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*
39
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15285.c
reference_id CVE-2010-3904
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15285.c
40
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44677.rb
reference_id CVE-2010-3904
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44677.rb
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3904
reference_id CVE-2010-3904
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-3904
42
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/294b2631591e088ef693aa366199300663fbc539/modules/exploits/linux/local/rds_priv_esc.rb
reference_id CVE-2010-3904
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/294b2631591e088ef693aa366199300663fbc539/modules/exploits/linux/local/rds_priv_esc.rb
43
reference_url http://www.vsecurity.com/resources/advisory/20101019-1/
reference_id CVE-2010-3904
reference_type exploit
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:31:23Z/
url http://www.vsecurity.com/resources/advisory/20101019-1/
44
reference_url https://access.redhat.com/errata/RHSA-2010:0792
reference_id RHSA-2010:0792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0792
45
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
46
reference_url https://usn.ubuntu.com/1000-1/
reference_id USN-1000-1
reference_type
scores
url https://usn.ubuntu.com/1000-1/
47
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
48
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
49
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
50
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
51
reference_url https://usn.ubuntu.com/1119-1/
reference_id USN-1119-1
reference_type
scores
url https://usn.ubuntu.com/1119-1/
fixed_packages
aliases CVE-2010-3904
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xcnp-gudk-3fec
12
url VCID-xps7-6pp7-a3b6
vulnerability_id VCID-xps7-6pp7-a3b6
summary kvm: invalid selector in fs/gs causes kernel panic
references
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3698.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3698.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3698
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26741
published_at 2026-04-29T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27031
published_at 2026-04-01T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2707
published_at 2026-04-02T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27106
published_at 2026-04-04T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26895
published_at 2026-04-07T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26963
published_at 2026-04-08T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27009
published_at 2026-04-09T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27013
published_at 2026-04-11T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26968
published_at 2026-04-12T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26911
published_at 2026-04-13T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26922
published_at 2026-04-16T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26898
published_at 2026-04-18T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26862
published_at 2026-04-21T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26814
published_at 2026-04-24T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26806
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3698
4
reference_url http://secunia.com/advisories/42745
reference_id
reference_type
scores
url http://secunia.com/advisories/42745
5
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
7
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2010-0898.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0898.html
9
reference_url http://www.securityfocus.com/bid/44500
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44500
10
reference_url http://www.vupen.com/english/advisories/2010/3123
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3123
11
reference_url http://www.vupen.com/english/advisories/2010/3321
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3321
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=639879
reference_id 639879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=639879
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3698
reference_id CVE-2010-3698
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3698
16
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
17
reference_url https://access.redhat.com/errata/RHSA-2010:0898
reference_id RHSA-2010:0898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0898
18
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
19
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
20
reference_url https://usn.ubuntu.com/1073-1/
reference_id USN-1073-1
reference_type
scores
url https://usn.ubuntu.com/1073-1/
21
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
22
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
23
reference_url https://usn.ubuntu.com/1081-1/
reference_id USN-1081-1
reference_type
scores
url https://usn.ubuntu.com/1081-1/
24
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
25
reference_url https://usn.ubuntu.com/1187-1/
reference_id USN-1187-1
reference_type
scores
url https://usn.ubuntu.com/1187-1/
fixed_packages
aliases CVE-2010-3698
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xps7-6pp7-a3b6
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.7.1%3Farch=el6