Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-5754-km4k-ukd3
Summarykernel: drivers/net/usb/hso.c: prevent reading uninitialized memory
Aliases
0
alias CVE-2010-3298
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.32-71.14.1?arch=el6
purl pkg:rpm/redhat/kernel@2.6.32-71.14.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13jv-4raj-3bc6
1
vulnerability VCID-1bhm-5xj1-duh8
2
vulnerability VCID-1d5z-ugrh-s7bj
3
vulnerability VCID-22bx-f76m-e3c1
4
vulnerability VCID-2m8w-7whg-jube
5
vulnerability VCID-381s-khqd-muhz
6
vulnerability VCID-3egz-urd4-yfbw
7
vulnerability VCID-519v-6b9u-dygr
8
vulnerability VCID-5754-km4k-ukd3
9
vulnerability VCID-5pu5-muu2-1bf3
10
vulnerability VCID-5x5t-fnw6-kqea
11
vulnerability VCID-643a-mvrh-bbap
12
vulnerability VCID-6x7p-5tt7-5fdv
13
vulnerability VCID-cbze-qxa8-37be
14
vulnerability VCID-cw6b-qbau-hbh7
15
vulnerability VCID-dbrc-nqc1-x3ap
16
vulnerability VCID-ek2s-wkm1-4ygb
17
vulnerability VCID-f744-pabt-7ffu
18
vulnerability VCID-gwuw-j14j-dffw
19
vulnerability VCID-j49x-d5sv-wkek
20
vulnerability VCID-m6hm-2cau-4fdg
21
vulnerability VCID-mcdj-296n-1kc9
22
vulnerability VCID-nej4-chcw-fqah
23
vulnerability VCID-nq55-xn3b-8qdm
24
vulnerability VCID-nub2-qpm7-n7gv
25
vulnerability VCID-pqms-kbb2-wua8
26
vulnerability VCID-rdyv-juby-e3gq
27
vulnerability VCID-sknd-kp51-juec
28
vulnerability VCID-uk6m-rq4u-nugy
29
vulnerability VCID-y21h-7qfs-1kb7
30
vulnerability VCID-zwvt-5gfz-suda
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.32-71.14.1%3Farch=el6
References
0
reference_url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
3
reference_url http://lkml.org/lkml/2010/9/11/167
reference_id
reference_type
scores
url http://lkml.org/lkml/2010/9/11/167
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3298.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3298.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3298
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.2141
published_at 2026-04-29T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.2157
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21743
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21798
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21549
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21626
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21684
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21696
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21657
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.216
published_at 2026-04-13T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21598
published_at 2026-04-16T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21606
published_at 2026-04-18T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21576
published_at 2026-04-21T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.21428
published_at 2026-04-24T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.21423
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3298
6
reference_url http://secunia.com/advisories/41440
reference_id
reference_type
scores
url http://secunia.com/advisories/41440
7
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
8
reference_url http://secunia.com/advisories/42890
reference_id
reference_type
scores
url http://secunia.com/advisories/42890
9
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5
10
reference_url http://www.openwall.com/lists/oss-security/2010/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/14/2
11
reference_url http://www.openwall.com/lists/oss-security/2010/09/14/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/14/7
12
reference_url http://www.redhat.com/support/errata/RHSA-2011-0007.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0007.html
13
reference_url http://www.securityfocus.com/bid/43226
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43226
14
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
15
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
16
reference_url http://www.vupen.com/english/advisories/2011/0298
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0298
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=633140
reference_id 633140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=633140
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3298
reference_id CVE-2010-3298
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3298
34
reference_url https://access.redhat.com/errata/RHSA-2011:0007
reference_id RHSA-2011:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0007
35
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
36
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
37
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
38
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
39
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score2.1 - 2.1
Exploitability0.5
Weighted_severity1.9
Risk_score0.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-5754-km4k-ukd3