Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-a5qw-zuvc-suhx
Summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
Aliases
0
alias CVE-2010-3314
Fixed_packages
0
url pkg:ebuild/dev-php/suhosin@0.9.33
purl pkg:ebuild/dev-php/suhosin@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-php/suhosin@0.9.33
1
url pkg:ebuild/dev-php/suhosin@0.32.2
purl pkg:ebuild/dev-php/suhosin@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-php/suhosin@0.32.2
2
url pkg:ebuild/dev-php/suhosin@1.8.004.20120613
purl pkg:ebuild/dev-php/suhosin@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-php/suhosin@1.8.004.20120613
3
url pkg:ebuild/dev-php/suhosin@3.33
purl pkg:ebuild/dev-php/suhosin@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-php/suhosin@3.33
4
url pkg:ebuild/net-analyzer/lft@0.32.2
purl pkg:ebuild/net-analyzer/lft@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/lft@0.32.2
5
url pkg:ebuild/net-analyzer/lft@1.8.004.20120613
purl pkg:ebuild/net-analyzer/lft@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/lft@1.8.004.20120613
6
url pkg:ebuild/net-analyzer/lft@3.33
purl pkg:ebuild/net-analyzer/lft@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/lft@3.33
7
url pkg:ebuild/net-im/gg-transport@0.9.33
purl pkg:ebuild/net-im/gg-transport@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@0.9.33
8
url pkg:ebuild/net-im/gg-transport@0.32.2
purl pkg:ebuild/net-im/gg-transport@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@0.32.2
9
url pkg:ebuild/net-im/gg-transport@1.0
purl pkg:ebuild/net-im/gg-transport@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@1.0
10
url pkg:ebuild/net-im/gg-transport@1.8.004.20120613
purl pkg:ebuild/net-im/gg-transport@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@1.8.004.20120613
11
url pkg:ebuild/net-im/gg-transport@2.2.4
purl pkg:ebuild/net-im/gg-transport@2.2.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@2.2.4
12
url pkg:ebuild/net-im/gg-transport@3.3.7
purl pkg:ebuild/net-im/gg-transport@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@3.3.7
13
url pkg:ebuild/net-im/gg-transport@3.33
purl pkg:ebuild/net-im/gg-transport@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-im/gg-transport@3.33
14
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
15
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
16
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
17
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
18
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
19
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
20
url pkg:ebuild/www-apps/egroupware@1.8.004.20120613
purl pkg:ebuild/www-apps/egroupware@1.8.004.20120613
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qky3-63zt-9fg6
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.8.004.20120613
21
url pkg:ebuild/x11-libs/vte@0.32.2
purl pkg:ebuild/x11-libs/vte@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/vte@0.32.2
22
url pkg:ebuild/x11-libs/vte@1.8.004.20120613
purl pkg:ebuild/x11-libs/vte@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/vte@1.8.004.20120613
23
url pkg:ebuild/x11-misc/slock@0.9.33
purl pkg:ebuild/x11-misc/slock@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/slock@0.9.33
24
url pkg:ebuild/x11-misc/slock@0.32.2
purl pkg:ebuild/x11-misc/slock@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/slock@0.32.2
25
url pkg:ebuild/x11-misc/slock@1.0
purl pkg:ebuild/x11-misc/slock@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/slock@1.0
26
url pkg:ebuild/x11-misc/slock@1.8.004.20120613
purl pkg:ebuild/x11-misc/slock@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/slock@1.8.004.20120613
27
url pkg:ebuild/x11-misc/slock@3.33
purl pkg:ebuild/x11-misc/slock@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-misc/slock@3.33
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3314
reference_id
reference_type
scores
0
value 0.01585
scoring_system epss
scoring_elements 0.81638
published_at 2026-04-21T12:55:00Z
1
value 0.01585
scoring_system epss
scoring_elements 0.81532
published_at 2026-04-01T12:55:00Z
2
value 0.01585
scoring_system epss
scoring_elements 0.81543
published_at 2026-04-02T12:55:00Z
3
value 0.01585
scoring_system epss
scoring_elements 0.81565
published_at 2026-04-04T12:55:00Z
4
value 0.01585
scoring_system epss
scoring_elements 0.81563
published_at 2026-04-07T12:55:00Z
5
value 0.01585
scoring_system epss
scoring_elements 0.81591
published_at 2026-04-08T12:55:00Z
6
value 0.01585
scoring_system epss
scoring_elements 0.81596
published_at 2026-04-13T12:55:00Z
7
value 0.01585
scoring_system epss
scoring_elements 0.81617
published_at 2026-04-11T12:55:00Z
8
value 0.01585
scoring_system epss
scoring_elements 0.81604
published_at 2026-04-12T12:55:00Z
9
value 0.01585
scoring_system epss
scoring_elements 0.81634
published_at 2026-04-16T12:55:00Z
10
value 0.01585
scoring_system epss
scoring_elements 0.81635
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3314
1
reference_url http://www.debian.org/security/2010/dsa-2013
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2013
2
reference_url http://www.egroupware.org/news?item=93
reference_id
reference_type
scores
url http://www.egroupware.org/news?item=93
3
reference_url http://www.exploit-db.com/exploits/11777/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/11777/
4
reference_url http://www.openwall.com/lists/oss-security/2010/09/21/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/21/7
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3314
reference_id CVE-2010-3314
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3314
14
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
Weaknesses
0
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Exploits
0
date_added 2010-03-15
description eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2010-03-16
exploit_type webapps
platform php
source_date_updated null
data_source Exploit-DB
source_url
Severity_range_score4.3 - 4.3
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-a5qw-zuvc-suhx