Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jqn8-xm6u-3kek
Summarykernel: xfs: validate inode numbers in file handles correctly
Aliases
0
alias CVE-2010-2943
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-194.17.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-194.17.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7nfh-37h1-puah
1
vulnerability VCID-bg6w-edht-bbav
2
vulnerability VCID-d172-uby3-43ez
3
vulnerability VCID-ebe8-3wes-3ue7
4
vulnerability VCID-etyb-fxrj-k3b6
5
vulnerability VCID-jqn8-xm6u-3kek
6
vulnerability VCID-y21h-7qfs-1kb7
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-194.17.1%3Farch=el5
References
0
reference_url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33767
1
reference_url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33768
2
reference_url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33769
3
reference_url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771
reference_id
reference_type
scores
url http://article.gmane.org/gmane.comp.file-systems.xfs.general/33771
4
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188
5
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d
6
reference_url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa
reference_id
reference_type
scores
url http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa
7
reference_url http://oss.sgi.com/archives/xfs/2010-06/msg00191.html
reference_id
reference_type
scores
url http://oss.sgi.com/archives/xfs/2010-06/msg00191.html
8
reference_url http://oss.sgi.com/archives/xfs/2010-06/msg00198.html
reference_id
reference_type
scores
url http://oss.sgi.com/archives/xfs/2010-06/msg00198.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2943.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2943.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2943
reference_id
reference_type
scores
0
value 0.03818
scoring_system epss
scoring_elements 0.88153
published_at 2026-04-29T12:55:00Z
1
value 0.03818
scoring_system epss
scoring_elements 0.88154
published_at 2026-04-26T12:55:00Z
2
value 0.03818
scoring_system epss
scoring_elements 0.8806
published_at 2026-04-01T12:55:00Z
3
value 0.03818
scoring_system epss
scoring_elements 0.88069
published_at 2026-04-02T12:55:00Z
4
value 0.03818
scoring_system epss
scoring_elements 0.88085
published_at 2026-04-04T12:55:00Z
5
value 0.03818
scoring_system epss
scoring_elements 0.8809
published_at 2026-04-07T12:55:00Z
6
value 0.03818
scoring_system epss
scoring_elements 0.8811
published_at 2026-04-08T12:55:00Z
7
value 0.03818
scoring_system epss
scoring_elements 0.88116
published_at 2026-04-09T12:55:00Z
8
value 0.03818
scoring_system epss
scoring_elements 0.88125
published_at 2026-04-11T12:55:00Z
9
value 0.03818
scoring_system epss
scoring_elements 0.88118
published_at 2026-04-12T12:55:00Z
10
value 0.03818
scoring_system epss
scoring_elements 0.88119
published_at 2026-04-13T12:55:00Z
11
value 0.03818
scoring_system epss
scoring_elements 0.88133
published_at 2026-04-16T12:55:00Z
12
value 0.03818
scoring_system epss
scoring_elements 0.88131
published_at 2026-04-21T12:55:00Z
13
value 0.03818
scoring_system epss
scoring_elements 0.88149
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2943
11
reference_url http://secunia.com/advisories/42758
reference_id
reference_type
scores
url http://secunia.com/advisories/42758
12
reference_url http://secunia.com/advisories/43161
reference_id
reference_type
scores
url http://secunia.com/advisories/43161
13
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
14
reference_url http://support.avaya.com/css/P8/documents/100113326
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100113326
15
reference_url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
16
reference_url http://www.openwall.com/lists/oss-security/2010/08/18/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/18/2
17
reference_url http://www.openwall.com/lists/oss-security/2010/08/19/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/08/19/5
18
reference_url http://www.redhat.com/support/errata/RHSA-2010-0723.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0723.html
19
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
20
reference_url http://www.securityfocus.com/bid/42527
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42527
21
reference_url http://www.ubuntu.com/usn/USN-1041-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1041-1
22
reference_url http://www.ubuntu.com/usn/USN-1057-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1057-1
23
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
24
reference_url http://www.vupen.com/english/advisories/2011/0070
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0070
25
reference_url http://www.vupen.com/english/advisories/2011/0280
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0280
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=624923
reference_id 624923
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=624923
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_presence_services:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_presence_services:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_presence_services:6.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_presence_services:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_presence_services:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_presence_services:6.1.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_session_manager:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_session_manager:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_session_manager:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_manager:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:6.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_manager:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_manager:6.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_platform:6.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_platform:6.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_platform:6.0:-:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_platform:6.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_system_platform:6.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_system_platform:6.0:sp1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_voice_portal:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_voice_portal:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_voice_portal:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_voice_portal:5.1:-:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_voice_portal:5.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_voice_portal:5.1:-:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_voice_portal:5.1:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:aura_voice_portal:5.1:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:aura_voice_portal:5.1:sp1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:iq:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:iq:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:iq:5.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:iq:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:avaya:iq:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:iq:5.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:-:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2943
reference_id CVE-2010-2943
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-2943
54
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15155.c
reference_id CVE-2010-2943;OSVDB-68303
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15155.c
55
reference_url https://access.redhat.com/errata/RHSA-2010:0723
reference_id RHSA-2010:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0723
56
reference_url https://usn.ubuntu.com/1041-1/
reference_id USN-1041-1
reference_type
scores
url https://usn.ubuntu.com/1041-1/
57
reference_url https://usn.ubuntu.com/1057-1/
reference_id USN-1057-1
reference_type
scores
url https://usn.ubuntu.com/1057-1/
58
reference_url https://usn.ubuntu.com/1072-1/
reference_id USN-1072-1
reference_type
scores
url https://usn.ubuntu.com/1072-1/
59
reference_url https://usn.ubuntu.com/1074-1/
reference_id USN-1074-1
reference_type
scores
url https://usn.ubuntu.com/1074-1/
60
reference_url https://usn.ubuntu.com/1074-2/
reference_id USN-1074-2
reference_type
scores
url https://usn.ubuntu.com/1074-2/
61
reference_url https://usn.ubuntu.com/1083-1/
reference_id USN-1083-1
reference_type
scores
url https://usn.ubuntu.com/1083-1/
62
reference_url https://usn.ubuntu.com/1093-1/
reference_id USN-1093-1
reference_type
scores
url https://usn.ubuntu.com/1093-1/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
0
date_added 2010-09-29
description XFS - Deleted Inode Local Information Disclosure
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2010-09-29
exploit_type local
platform linux
source_date_updated 2010-09-29
data_source Exploit-DB
source_url
Severity_range_score6.4 - 8.1
Exploitability2.0
Weighted_severity7.3
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jqn8-xm6u-3kek