Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qx2w-etz4-kybx
Summaryxen: request-processing loop is unbounded in blkback
Aliases
0
alias CVE-2010-4247
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/kernel@2.6.18-194.32.1?arch=el5
purl pkg:rpm/redhat/kernel@2.6.18-194.32.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2m8w-7whg-jube
1
vulnerability VCID-381s-khqd-muhz
2
vulnerability VCID-3hpq-y376-k3cd
3
vulnerability VCID-6x7p-5tt7-5fdv
4
vulnerability VCID-8fkd-5ked-xyes
5
vulnerability VCID-gwuw-j14j-dffw
6
vulnerability VCID-m6hm-2cau-4fdg
7
vulnerability VCID-nej4-chcw-fqah
8
vulnerability VCID-q4p1-vxct-cybq
9
vulnerability VCID-qx2w-etz4-kybx
10
vulnerability VCID-t5zj-36y8-bbdt
11
vulnerability VCID-ttz3-sqez-7ffq
12
vulnerability VCID-v5g5-3pv6-dqa4
13
vulnerability VCID-vwj3-5b6z-17b1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-194.32.1%3Farch=el5
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4247.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4247
reference_id
reference_type
scores
0
value 0.00615
scoring_system epss
scoring_elements 0.69984
published_at 2026-04-29T12:55:00Z
1
value 0.00615
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-01T12:55:00Z
2
value 0.00615
scoring_system epss
scoring_elements 0.69841
published_at 2026-04-02T12:55:00Z
3
value 0.00615
scoring_system epss
scoring_elements 0.69856
published_at 2026-04-04T12:55:00Z
4
value 0.00615
scoring_system epss
scoring_elements 0.69833
published_at 2026-04-07T12:55:00Z
5
value 0.00615
scoring_system epss
scoring_elements 0.69881
published_at 2026-04-08T12:55:00Z
6
value 0.00615
scoring_system epss
scoring_elements 0.69897
published_at 2026-04-09T12:55:00Z
7
value 0.00615
scoring_system epss
scoring_elements 0.6992
published_at 2026-04-11T12:55:00Z
8
value 0.00615
scoring_system epss
scoring_elements 0.69905
published_at 2026-04-12T12:55:00Z
9
value 0.00615
scoring_system epss
scoring_elements 0.69891
published_at 2026-04-13T12:55:00Z
10
value 0.00615
scoring_system epss
scoring_elements 0.69932
published_at 2026-04-16T12:55:00Z
11
value 0.00615
scoring_system epss
scoring_elements 0.69941
published_at 2026-04-18T12:55:00Z
12
value 0.00615
scoring_system epss
scoring_elements 0.69923
published_at 2026-04-21T12:55:00Z
13
value 0.00615
scoring_system epss
scoring_elements 0.69974
published_at 2026-04-24T12:55:00Z
14
value 0.00615
scoring_system epss
scoring_elements 0.69983
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4247
2
reference_url http://secunia.com/advisories/35093
reference_id
reference_type
scores
url http://secunia.com/advisories/35093
3
reference_url http://secunia.com/advisories/42789
reference_id
reference_type
scores
url http://secunia.com/advisories/42789
4
reference_url http://secunia.com/advisories/46397
reference_id
reference_type
scores
url http://secunia.com/advisories/46397
5
reference_url http://www.openwall.com/lists/oss-security/2010/11/23/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/23/1
6
reference_url http://www.openwall.com/lists/oss-security/2010/11/24/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/11/24/8
7
reference_url http://www.redhat.com/support/errata/RHSA-2011-0004.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0004.html
8
reference_url http://www.securityfocus.com/archive/1/520102/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/520102/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/45029
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45029
10
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0012.html
11
reference_url http://www.vupen.com/english/advisories/2011/0024
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0024
12
reference_url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c
reference_id
reference_type
scores
url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/7070d34f251c
13
reference_url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d
reference_id
reference_type
scores
url http://xenbits.xensource.com/linux-2.6.18-xen.hg?rev/77f831cbb91d
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=656206
reference_id 656206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=656206
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4247
reference_id CVE-2010-4247
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-4247
29
reference_url https://access.redhat.com/errata/RHSA-2011:0004
reference_id RHSA-2011:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0004
30
reference_url https://usn.ubuntu.com/1170-1/
reference_id USN-1170-1
reference_type
scores
url https://usn.ubuntu.com/1170-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score5.5 - 5.5
Exploitability0.5
Weighted_severity5.0
Risk_score2.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qx2w-etz4-kybx