Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ewd8-ytvq-h7aw
Summarykernel: local privilege escalation via /sys/kernel/debug/acpi/custom_method
Aliases
0
alias CVE-2010-4347
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
purl pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55?arch=el5rt
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13jv-4raj-3bc6
1
vulnerability VCID-1bhm-5xj1-duh8
2
vulnerability VCID-1d5z-ugrh-s7bj
3
vulnerability VCID-2v2h-1vgg-qubq
4
vulnerability VCID-57xt-prud-ruga
5
vulnerability VCID-6x7p-5tt7-5fdv
6
vulnerability VCID-ccy6-xxzm-vbb4
7
vulnerability VCID-dg9k-nfvc-k7en
8
vulnerability VCID-ek2s-wkm1-4ygb
9
vulnerability VCID-ewd8-ytvq-h7aw
10
vulnerability VCID-gwuw-j14j-dffw
11
vulnerability VCID-k9ct-x12b-cfd6
12
vulnerability VCID-mcdj-296n-1kc9
13
vulnerability VCID-qraj-ye4g-8qdr
14
vulnerability VCID-uk6m-rq4u-nugy
15
vulnerability VCID-uxye-sz24-dqd4
16
vulnerability VCID-xr4s-smmp-fubc
17
vulnerability VCID-ydtx-ae9c-eqah
18
vulnerability VCID-zumd-vknc-87ba
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55%3Farch=el5rt
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url http://openwall.com/lists/oss-security/2010/12/15/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/15/3
4
reference_url http://openwall.com/lists/oss-security/2010/12/15/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2010/12/15/7
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4347.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4347.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4347
reference_id
reference_type
scores
0
value 0.0594
scoring_system epss
scoring_elements 0.90665
published_at 2026-04-26T12:55:00Z
1
value 0.0594
scoring_system epss
scoring_elements 0.90591
published_at 2026-04-01T12:55:00Z
2
value 0.0594
scoring_system epss
scoring_elements 0.90595
published_at 2026-04-02T12:55:00Z
3
value 0.0594
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-04T12:55:00Z
4
value 0.0594
scoring_system epss
scoring_elements 0.90613
published_at 2026-04-07T12:55:00Z
5
value 0.0594
scoring_system epss
scoring_elements 0.90624
published_at 2026-04-08T12:55:00Z
6
value 0.0594
scoring_system epss
scoring_elements 0.9063
published_at 2026-04-09T12:55:00Z
7
value 0.0594
scoring_system epss
scoring_elements 0.90639
published_at 2026-04-12T12:55:00Z
8
value 0.0594
scoring_system epss
scoring_elements 0.90634
published_at 2026-04-13T12:55:00Z
9
value 0.0594
scoring_system epss
scoring_elements 0.90653
published_at 2026-04-16T12:55:00Z
10
value 0.0594
scoring_system epss
scoring_elements 0.90651
published_at 2026-04-18T12:55:00Z
11
value 0.0594
scoring_system epss
scoring_elements 0.90648
published_at 2026-04-21T12:55:00Z
12
value 0.0594
scoring_system epss
scoring_elements 0.90663
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4347
7
reference_url http://secunia.com/advisories/42778
reference_id
reference_type
scores
url http://secunia.com/advisories/42778
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64155
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64155
9
reference_url http://www.exploit-db.com/exploits/15774/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/15774/
10
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
11
reference_url http://www.securityfocus.com/bid/45408
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45408
12
reference_url http://www.vupen.com/english/advisories/2011/0012
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0012
13
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=663542
reference_id 663542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=663542
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4347
reference_id CVE-2010-4347
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4347
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15774.c
reference_id CVE-2011-1021;OSVDB-70022;CVE-2010-4347
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15774.c
20
reference_url https://access.redhat.com/errata/RHSA-2011:0330
reference_id RHSA-2011:0330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0330
Weaknesses
0
cwe_id 269
name Improper Privilege Management
description The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Exploits
0
date_added 2010-12-18
description Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2010-12-18
exploit_type local
platform linux
source_date_updated 2016-10-10
data_source Exploit-DB
source_url
Severity_range_score6.9 - 6.9
Exploitability2.0
Weighted_severity6.2
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ewd8-ytvq-h7aw