Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-4k1s-fghb-p3bb
Summarykernel: IA32 System Call Entry Point Vulnerability
Aliases
0
alias CVE-2010-3301
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.32-71.7.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.7.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-229q-sxf7-8bgu
1
vulnerability VCID-3vwf-bjs1-6bg9
2
vulnerability VCID-4k1s-fghb-p3bb
3
vulnerability VCID-5dmd-zwje-pqek
4
vulnerability VCID-8fkd-5ked-xyes
5
vulnerability VCID-fjh9-4gn3-6feg
6
vulnerability VCID-nftw-r2j9-y7cp
7
vulnerability VCID-pmch-au5t-2fh5
8
vulnerability VCID-qnqy-k1r2-ckf5
9
vulnerability VCID-ux7d-jpk1-7ubt
10
vulnerability VCID-vwj3-5b6z-17b1
11
vulnerability VCID-xcnp-gudk-3fec
12
vulnerability VCID-xps7-6pp7-a3b6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.7.1%3Farch=el6
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=36d001c70d8a0144ac1d038f6876c484849a74de
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=36d001c70d8a0144ac1d038f6876c484849a74de
1
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eefdca043e8391dcd719711716492063030b55ac
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eefdca043e8391dcd719711716492063030b55ac
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3301.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3301.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3301
reference_id
reference_type
scores
0
value 0.06169
scoring_system epss
scoring_elements 0.90784
published_at 2026-04-01T12:55:00Z
1
value 0.06169
scoring_system epss
scoring_elements 0.9079
published_at 2026-04-02T12:55:00Z
2
value 0.06169
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-04T12:55:00Z
3
value 0.06169
scoring_system epss
scoring_elements 0.90812
published_at 2026-04-07T12:55:00Z
4
value 0.06169
scoring_system epss
scoring_elements 0.90823
published_at 2026-04-08T12:55:00Z
5
value 0.06169
scoring_system epss
scoring_elements 0.9083
published_at 2026-04-09T12:55:00Z
6
value 0.06169
scoring_system epss
scoring_elements 0.90838
published_at 2026-04-11T12:55:00Z
7
value 0.06614
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-18T12:55:00Z
8
value 0.06614
scoring_system epss
scoring_elements 0.9122
published_at 2026-04-26T12:55:00Z
9
value 0.06614
scoring_system epss
scoring_elements 0.91182
published_at 2026-04-13T12:55:00Z
10
value 0.06614
scoring_system epss
scoring_elements 0.91219
published_at 2026-04-29T12:55:00Z
11
value 0.06614
scoring_system epss
scoring_elements 0.91209
published_at 2026-04-21T12:55:00Z
12
value 0.06614
scoring_system epss
scoring_elements 0.91221
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3301
6
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
7
reference_url http://sota.gen.nz/compat2/
reference_id
reference_type
scores
url http://sota.gen.nz/compat2/
8
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:247
11
reference_url http://www.openwall.com/lists/oss-security/2010/09/16/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/16/1
12
reference_url http://www.openwall.com/lists/oss-security/2010/09/16/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/16/3
13
reference_url http://www.redhat.com/support/errata/RHSA-2010-0842.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0842.html
14
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
15
reference_url http://www.vupen.com/english/advisories/2010/3117
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3117
16
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
17
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=634449
reference_id 634449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=634449
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3301
reference_id CVE-2010-3301
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3301
29
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15023.c
reference_id CVE-2010-3301;OSVDB-68192
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/15023.c
30
reference_url https://access.redhat.com/errata/RHSA-2010:0842
reference_id RHSA-2010:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0842
31
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
32
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
33
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
34
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
35
reference_url https://usn.ubuntu.com/988-1/
reference_id USN-988-1
reference_type
scores
url https://usn.ubuntu.com/988-1/
Weaknesses
0
cwe_id 681
name Incorrect Conversion between Numeric Types
description When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
2
cwe_id 269
name Improper Privilege Management
description The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Exploits
0
date_added 2010-09-16
description Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2010-09-16
exploit_type local
platform linux_x86-64
source_date_updated 2016-11-28
data_source Exploit-DB
source_url
Severity_range_score7.2 - 7.2
Exploitability2.0
Weighted_severity6.5
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-4k1s-fghb-p3bb