Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-xp1f-4p3v-67ad
Summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
Aliases
0
alias CVE-2010-2941
Fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7?distro=trixie
purl pkg:deb/debian/cups@1.4.4-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%3Fdistro=trixie
1
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
2
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie
3
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie
4
url pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/cups@2.4.16-1?distro=trixie
purl pkg:deb/debian/cups@2.4.16-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-r1q4-2dq2-33ca
5
vulnerability VCID-ry9y-z4e4-yfdh
6
vulnerability VCID-vgtp-sjtt-73e9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie
6
url pkg:deb/debian/cups@2.4.17-1?distro=trixie
purl pkg:deb/debian/cups@2.4.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie
7
url pkg:ebuild/net-print/cups@1.4.8-r1
purl pkg:ebuild/net-print/cups@1.4.8-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.4.8-r1
Affected_packages
0
url pkg:deb/debian/cups@1.3.8-1%2Blenny10
purl pkg:deb/debian/cups@1.3.8-1%2Blenny10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-2weh-q66p-8bdg
2
vulnerability VCID-35gf-189e-3ud4
3
vulnerability VCID-39f1-22a5-c7aw
4
vulnerability VCID-3ame-feez-yqhc
5
vulnerability VCID-3etj-2m21-ffa1
6
vulnerability VCID-44ju-8618-vqht
7
vulnerability VCID-48ht-j7ga-9ugq
8
vulnerability VCID-4bxg-5tnm-y3hw
9
vulnerability VCID-4he8-q3nc-3bf7
10
vulnerability VCID-6mus-21kz-uuhz
11
vulnerability VCID-7gbc-682w-5fdq
12
vulnerability VCID-7wg4-sc9v-bffk
13
vulnerability VCID-843p-8xve-nfer
14
vulnerability VCID-8yv6-g189-vugt
15
vulnerability VCID-993k-m3sq-gufu
16
vulnerability VCID-am36-6m5v-fkba
17
vulnerability VCID-anr5-gc12-e7dr
18
vulnerability VCID-apyh-1uza-pffa
19
vulnerability VCID-aznw-8yer-xfhf
20
vulnerability VCID-bj8b-t1mc-zfd3
21
vulnerability VCID-bzht-vhe3-y7bf
22
vulnerability VCID-cf81-58ju-bqaz
23
vulnerability VCID-ed99-uccv-d7bh
24
vulnerability VCID-ev9c-v5dv-37fb
25
vulnerability VCID-fby6-8f6z-63fw
26
vulnerability VCID-fkyp-m1p9-mfhy
27
vulnerability VCID-fpbv-zqer-w7c3
28
vulnerability VCID-g2x8-pm39-sfer
29
vulnerability VCID-k4yw-jg6v-1bcc
30
vulnerability VCID-mcmb-bvw9-dba5
31
vulnerability VCID-mp2s-4x2a-h7fq
32
vulnerability VCID-mtwe-dgnd-c3fj
33
vulnerability VCID-mtzd-538p-kbhm
34
vulnerability VCID-p8gy-dd3u-uqh4
35
vulnerability VCID-pwkd-sgtt-1bef
36
vulnerability VCID-q8a8-fd7r-1kg7
37
vulnerability VCID-qjzr-avt1-fyfd
38
vulnerability VCID-qxwq-vp9g-ukca
39
vulnerability VCID-ucmb-we3r-aqcd
40
vulnerability VCID-ukec-69r2-xbef
41
vulnerability VCID-uqp7-5pb9-w7cg
42
vulnerability VCID-ur43-jbhj-k7bk
43
vulnerability VCID-vmjh-9kbz-qkh6
44
vulnerability VCID-vx54-r2dt-8ue5
45
vulnerability VCID-w17y-dvuq-7ba6
46
vulnerability VCID-wjht-u5u1-kkas
47
vulnerability VCID-wqu4-wys6-hfbb
48
vulnerability VCID-xp1f-4p3v-67ad
49
vulnerability VCID-y7a9-2p1n-z7fx
50
vulnerability VCID-yyrd-qt22-w3f5
51
vulnerability VCID-zjj3-g2d7-c3gd
52
vulnerability VCID-zm2g-nduw-tfcy
53
vulnerability VCID-zt43-htwu-kfde
54
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.3.8-1%252Blenny10
1
url pkg:rpm/redhat/cups@1:1.3.7-18.el5_5?arch=8
purl pkg:rpm/redhat/cups@1:1.3.7-18.el5_5?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fpbv-zqer-w7c3
1
vulnerability VCID-xp1f-4p3v-67ad
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.3.7-18.el5_5%3Farch=8
2
url pkg:rpm/redhat/cups@1:1.4.2-35.el6_0?arch=1
purl pkg:rpm/redhat/cups@1:1.4.2-35.el6_0?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xp1f-4p3v-67ad
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.4.2-35.el6_0%3Farch=1
References
0
reference_url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
reference_id
reference_type
scores
url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2010-0811.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2010-0811.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2941
reference_id
reference_type
scores
0
value 0.21353
scoring_system epss
scoring_elements 0.95705
published_at 2026-04-18T12:55:00Z
1
value 0.21353
scoring_system epss
scoring_elements 0.95701
published_at 2026-04-16T12:55:00Z
2
value 0.21353
scoring_system epss
scoring_elements 0.95658
published_at 2026-04-01T12:55:00Z
3
value 0.21353
scoring_system epss
scoring_elements 0.95667
published_at 2026-04-02T12:55:00Z
4
value 0.21353
scoring_system epss
scoring_elements 0.95673
published_at 2026-04-04T12:55:00Z
5
value 0.21353
scoring_system epss
scoring_elements 0.95675
published_at 2026-04-07T12:55:00Z
6
value 0.21353
scoring_system epss
scoring_elements 0.95684
published_at 2026-04-08T12:55:00Z
7
value 0.21353
scoring_system epss
scoring_elements 0.95688
published_at 2026-04-09T12:55:00Z
8
value 0.21353
scoring_system epss
scoring_elements 0.95692
published_at 2026-04-11T12:55:00Z
9
value 0.21353
scoring_system epss
scoring_elements 0.95691
published_at 2026-04-12T12:55:00Z
10
value 0.21353
scoring_system epss
scoring_elements 0.95693
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2941
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
10
reference_url http://secunia.com/advisories/42287
reference_id
reference_type
scores
url http://secunia.com/advisories/42287
11
reference_url http://secunia.com/advisories/42867
reference_id
reference_type
scores
url http://secunia.com/advisories/42867
12
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
13
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
14
reference_url http://securitytracker.com/id?1024662
reference_id
reference_type
scores
url http://securitytracker.com/id?1024662
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/62882
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/62882
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
22
reference_url http://www.osvdb.org/68951
reference_id
reference_type
scores
url http://www.osvdb.org/68951
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0866.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0866.html
24
reference_url http://www.securityfocus.com/bid/44530
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44530
25
reference_url http://www.ubuntu.com/usn/USN-1012-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1012-1
26
reference_url http://www.vupen.com/english/advisories/2010/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2856
27
reference_url http://www.vupen.com/english/advisories/2010/3042
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3042
28
reference_url http://www.vupen.com/english/advisories/2010/3088
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3088
29
reference_url http://www.vupen.com/english/advisories/2011/0061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0061
30
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344
reference_id 603344
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=624438
reference_id 624438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=624438
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2941
reference_id CVE-2010-2941
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-2941
58
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
59
reference_url https://access.redhat.com/errata/RHSA-2010:0811
reference_id RHSA-2010:0811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0811
60
reference_url https://access.redhat.com/errata/RHSA-2010:0866
reference_id RHSA-2010:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0866
61
reference_url https://usn.ubuntu.com/1012-1/
reference_id USN-1012-1
reference_type
scores
url https://usn.ubuntu.com/1012-1/
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Exploits
Severity_range_score9.3 - 9.8
Exploitability0.5
Weighted_severity8.8
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-xp1f-4p3v-67ad