Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/cups@1:1.1.17-13.3?arch=70
Typerpm
Namespaceredhat
Namecups
Version1:1.1.17-13.3
Qualifiers
arch 70
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-neqs-cg1p-7bb7
vulnerability_id VCID-neqs-cg1p-7bb7
summary
Multiple vulnerabilities have been found in Poppler, some of which
    may allow execution of arbitrary code.
references
0
reference_url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
reference_id
reference_type
scores
url ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
1
reference_url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
reference_id
reference_type
scores
url http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2012-1201.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1201.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3702.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
reference_id
reference_type
scores
0
value 0.02916
scoring_system epss
scoring_elements 0.86395
published_at 2026-04-21T12:55:00Z
1
value 0.02916
scoring_system epss
scoring_elements 0.86316
published_at 2026-04-01T12:55:00Z
2
value 0.02916
scoring_system epss
scoring_elements 0.86326
published_at 2026-04-02T12:55:00Z
3
value 0.02916
scoring_system epss
scoring_elements 0.86345
published_at 2026-04-04T12:55:00Z
4
value 0.02916
scoring_system epss
scoring_elements 0.86346
published_at 2026-04-07T12:55:00Z
5
value 0.02916
scoring_system epss
scoring_elements 0.86364
published_at 2026-04-08T12:55:00Z
6
value 0.02916
scoring_system epss
scoring_elements 0.86374
published_at 2026-04-09T12:55:00Z
7
value 0.02916
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-11T12:55:00Z
8
value 0.02916
scoring_system epss
scoring_elements 0.86385
published_at 2026-04-12T12:55:00Z
9
value 0.02916
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-13T12:55:00Z
10
value 0.02916
scoring_system epss
scoring_elements 0.86397
published_at 2026-04-16T12:55:00Z
11
value 0.02916
scoring_system epss
scoring_elements 0.86402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3702
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702
15
reference_url http://secunia.com/advisories/42141
reference_id
reference_type
scores
url http://secunia.com/advisories/42141
16
reference_url http://secunia.com/advisories/42357
reference_id
reference_type
scores
url http://secunia.com/advisories/42357
17
reference_url http://secunia.com/advisories/42397
reference_id
reference_type
scores
url http://secunia.com/advisories/42397
18
reference_url http://secunia.com/advisories/42691
reference_id
reference_type
scores
url http://secunia.com/advisories/42691
19
reference_url http://secunia.com/advisories/43079
reference_id
reference_type
scores
url http://secunia.com/advisories/43079
20
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
21
reference_url http://www.debian.org/security/2010/dsa-2119
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2119
22
reference_url http://www.debian.org/security/2010/dsa-2135
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2135
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
24
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
28
reference_url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
reference_id
reference_type
scores
url http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
29
reference_url http://www.openwall.com/lists/oss-security/2010/10/04/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/04/6
30
reference_url http://www.redhat.com/support/errata/RHSA-2010-0749.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0749.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2010-0750.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0750.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2010-0751.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0751.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2010-0752.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0752.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2010-0753.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0753.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2010-0754.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0754.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2010-0755.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0755.html
37
reference_url http://www.redhat.com/support/errata/RHSA-2010-0859.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0859.html
38
reference_url http://www.securityfocus.com/bid/43845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43845
39
reference_url http://www.ubuntu.com/usn/USN-1005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1005-1
40
reference_url http://www.vupen.com/english/advisories/2010/2897
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2897
41
reference_url http://www.vupen.com/english/advisories/2010/3097
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3097
42
reference_url http://www.vupen.com/english/advisories/2011/0230
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0230
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=595245
reference_id 595245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=595245
44
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
reference_id 599165
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599165
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_id cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
reference_id CVE-2010-3702
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3702
75
reference_url https://security.gentoo.org/glsa/201310-03
reference_id GLSA-201310-03
reference_type
scores
url https://security.gentoo.org/glsa/201310-03
76
reference_url https://security.gentoo.org/glsa/201402-17
reference_id GLSA-201402-17
reference_type
scores
url https://security.gentoo.org/glsa/201402-17
77
reference_url https://access.redhat.com/errata/RHSA-2010:0749
reference_id RHSA-2010:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0749
78
reference_url https://access.redhat.com/errata/RHSA-2010:0750
reference_id RHSA-2010:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0750
79
reference_url https://access.redhat.com/errata/RHSA-2010:0751
reference_id RHSA-2010:0751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0751
80
reference_url https://access.redhat.com/errata/RHSA-2010:0752
reference_id RHSA-2010:0752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0752
81
reference_url https://access.redhat.com/errata/RHSA-2010:0753
reference_id RHSA-2010:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0753
82
reference_url https://access.redhat.com/errata/RHSA-2010:0754
reference_id RHSA-2010:0754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0754
83
reference_url https://access.redhat.com/errata/RHSA-2010:0755
reference_id RHSA-2010:0755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0755
84
reference_url https://access.redhat.com/errata/RHSA-2010:0859
reference_id RHSA-2010:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0859
85
reference_url https://access.redhat.com/errata/RHSA-2012:1201
reference_id RHSA-2012:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1201
86
reference_url https://usn.ubuntu.com/1005-1/
reference_id USN-1005-1
reference_type
scores
url https://usn.ubuntu.com/1005-1/
fixed_packages
aliases CVE-2010-3702
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-neqs-cg1p-7bb7
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.1.17-13.3%3Farch=70