Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-376v-6shk-8ycq
SummaryApache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
Aliases
0
alias CVE-2010-2952
Fixed_packages
0
url pkg:deb/debian/trafficserver@0?distro=sid
purl pkg:deb/debian/trafficserver@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@0%3Fdistro=sid
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-kjah-am9e-xkev
7
vulnerability VCID-tevw-8dcp-yfh6
8
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid
3
url pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-jabw-thzt-63bb
7
vulnerability VCID-kjah-am9e-xkev
8
vulnerability VCID-rcdg-j23x-xfbn
9
vulnerability VCID-tevw-8dcp-yfh6
10
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2952
reference_id
reference_type
scores
0
value 0.01206
scoring_system epss
scoring_elements 0.78981
published_at 2026-04-21T12:55:00Z
1
value 0.01206
scoring_system epss
scoring_elements 0.7891
published_at 2026-04-01T12:55:00Z
2
value 0.01206
scoring_system epss
scoring_elements 0.78916
published_at 2026-04-02T12:55:00Z
3
value 0.01206
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-04T12:55:00Z
4
value 0.01206
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-07T12:55:00Z
5
value 0.01206
scoring_system epss
scoring_elements 0.78953
published_at 2026-04-08T12:55:00Z
6
value 0.01206
scoring_system epss
scoring_elements 0.78959
published_at 2026-04-09T12:55:00Z
7
value 0.01206
scoring_system epss
scoring_elements 0.78982
published_at 2026-04-18T12:55:00Z
8
value 0.01206
scoring_system epss
scoring_elements 0.78967
published_at 2026-04-12T12:55:00Z
9
value 0.01206
scoring_system epss
scoring_elements 0.78957
published_at 2026-04-13T12:55:00Z
10
value 0.01206
scoring_system epss
scoring_elements 0.78985
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2952
1
reference_url http://secunia.com/advisories/41356
reference_id
reference_type
scores
url http://secunia.com/advisories/41356
2
reference_url http://securitytracker.com/id?1024417
reference_id
reference_type
scores
url http://securitytracker.com/id?1024417
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/61721
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/61721
4
reference_url https://issues.apache.org/jira/browse/TS-425
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/TS-425
5
reference_url http://trafficserver.apache.org/
reference_id
reference_type
scores
url http://trafficserver.apache.org/
6
reference_url http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc
reference_id
reference_type
scores
url http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc
7
reference_url http://www.securityfocus.com/archive/1/513598/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/513598/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/43111
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43111
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2952
reference_id CVE-2010-2952
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-2952
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.3 - 4.3
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-376v-6shk-8ycq