Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127530?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127530?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.9-89.35.1?arch=EL", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.9-89.35.1", "qualifiers": { "arch": "EL" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87663?format=api", "vulnerability_id": "VCID-519v-6b9u-dygr", "summary": "kernel: drivers/serial/serial_core.c: reading uninitialized stack memory", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862" }, { "reference_url": "http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23772", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23958", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24084", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23904", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23971", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23946", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23935", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2379", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23779", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23619", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23701", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4075" }, { "reference_url": "http://secunia.com/advisories/42884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42884" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/09/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/09/25/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/06/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/06/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/07/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/25/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/25/3" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/43806", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43806" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=648660", "reference_id": "648660", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648660" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4075", "reference_id": "CVE-2010-4075", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0017", "reference_id": "RHSA-2011:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1086-1/", "reference_id": "USN-1086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1086-1/" }, { "reference_url": "https://usn.ubuntu.com/1089-1/", "reference_id": "USN-1089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1089-1/" }, { "reference_url": "https://usn.ubuntu.com/1090-1/", "reference_id": "USN-1090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1090-1/" }, { "reference_url": "https://usn.ubuntu.com/1092-1/", "reference_id": "USN-1092-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1092-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1105-1/", "reference_id": "USN-1105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1105-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4075" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-519v-6b9u-dygr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87653?format=api", "vulnerability_id": "VCID-5x5t-fnw6-kqea", "summary": "kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "reference_url": "http://lkml.org/lkml/2010/9/25/41", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.org/lkml/2010/9/25/41" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4080", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23772", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23958", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24084", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23904", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23971", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23946", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23935", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2379", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23779", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23619", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23701", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4080" }, { "reference_url": "http://secunia.com/advisories/42778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42778" }, { "reference_url": "http://secunia.com/advisories/42801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42801" }, { "reference_url": "http://secunia.com/advisories/42884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42884" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/09/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/09/25/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/06/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/06/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/07/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/25/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/25/3" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45058" }, { "reference_url": "http://www.securityfocus.com/bid/45063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45063" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=648669", "reference_id": "648669", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648669" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4080", "reference_id": "CVE-2010-4080", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0017", "reference_id": "RHSA-2011:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1041-1/", "reference_id": "USN-1041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1041-1/" }, { "reference_url": "https://usn.ubuntu.com/1071-1/", "reference_id": "USN-1071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1071-1/" }, { "reference_url": "https://usn.ubuntu.com/1072-1/", "reference_id": "USN-1072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1072-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4080" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5x5t-fnw6-kqea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87640?format=api", "vulnerability_id": "VCID-643a-mvrh-bbap", "summary": "kernel: ipc/compat*.c: reading uninitialized stack memory", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "reference_url": "http://lkml.org/lkml/2010/10/6/492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.org/lkml/2010/10/6/492" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4073", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49501", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49475", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49484", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49534", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4954", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4953", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49495", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49413", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49473", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4073" }, { "reference_url": "http://secunia.com/advisories/42778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42778" }, { "reference_url": "http://secunia.com/advisories/42884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42884" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42932" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/43291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43291" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://securityreason.com/securityalert/8366", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/8366" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/07/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/25/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/25/3" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45073" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=648658", "reference_id": "648658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648658" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4073", "reference_id": "CVE-2010-4073", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0017", "reference_id": "RHSA-2011:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1054-1/", "reference_id": "USN-1054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1054-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1074-1/", "reference_id": "USN-1074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1074-1/" }, { "reference_url": "https://usn.ubuntu.com/1074-2/", "reference_id": "USN-1074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1074-2/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4073" ], "risk_score": 3.4, "exploitability": "2.0", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-643a-mvrh-bbap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87635?format=api", "vulnerability_id": "VCID-6x7p-5tt7-5fdv", "summary": "kernel: missing tty ops write function presence check in hci_uart_tty_open()", "references": [ { "reference_url": "http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29926", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30393", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30422", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30468", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30278", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3033", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30283", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30297", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3028", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30235", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3017", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30055", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.2998", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29917", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4242" }, { "reference_url": "http://secunia.com/advisories/42789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42789" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/43291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43291" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64617" }, { "reference_url": "https://lkml.org/lkml/2010/10/7/255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lkml.org/lkml/2010/10/7/255" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45014", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45014" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "reference_url": "http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410", "reference_id": "641410", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4242", "reference_id": "CVE-2010-4242", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0004", "reference_id": "RHSA-2011:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://usn.ubuntu.com/1041-1/", "reference_id": "USN-1041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1041-1/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1089-1/", "reference_id": "USN-1089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1089-1/" }, { "reference_url": "https://usn.ubuntu.com/1092-1/", "reference_id": "USN-1092-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1092-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1105-1/", "reference_id": "USN-1105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1105-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4242" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6x7p-5tt7-5fdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87589?format=api", "vulnerability_id": "VCID-f744-pabt-7ffu", "summary": "kernel: socket filters infoleak", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41735", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41939", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42028", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42005", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42038", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42001", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42035", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42009", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41878", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.4187", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41649", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41717", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4158" }, { "reference_url": "http://secunia.com/advisories/42745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42745" }, { "reference_url": "http://secunia.com/advisories/42778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42778" }, { "reference_url": "http://secunia.com/advisories/42801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42801" }, { "reference_url": "http://secunia.com/advisories/42884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42884" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42932" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/43291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43291" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/514705", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/514705" }, { "reference_url": "http://www.securityfocus.com/archive/1/514845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/514845" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/44758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44758" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg146361.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg146361.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3321", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=651698", "reference_id": "651698", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651698" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4158", "reference_id": "CVE-2010-4158", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4158" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c", "reference_id": "CVE-2010-4158;OSVDB-69190", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c" }, { "reference_url": "https://www.securityfocus.com/bid/44758/info", "reference_id": "CVE-2010-4158;OSVDB-69190", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/44758/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0017", "reference_id": "RHSA-2011:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1054-1/", "reference_id": "USN-1054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1054-1/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1086-1/", "reference_id": "USN-1086-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1086-1/" }, { "reference_url": "https://usn.ubuntu.com/1089-1/", "reference_id": "USN-1089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1089-1/" }, { "reference_url": "https://usn.ubuntu.com/1092-1/", "reference_id": "USN-1092-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1092-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1105-1/", "reference_id": "USN-1105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1105-1/" }, { "reference_url": "https://usn.ubuntu.com/1119-1/", "reference_id": "USN-1119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1119-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4158" ], "risk_score": 3.8, "exploitability": "2.0", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f744-pabt-7ffu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87616?format=api", "vulnerability_id": "VCID-m6hm-2cau-4fdg", "summary": "kernel: net/packet/af_packet.c: reading uninitialized stack memory", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f" }, { "reference_url": "http://marc.info/?l=linux-netdev&m=128854507220908&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=linux-netdev&m=128854507220908&w=2" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/02/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/02/10" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/02/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/02/12" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/02/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/02/7" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/02/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/02/9" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/04/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/04/5" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3876", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17919", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1806", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18061", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18037", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1798", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1799", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18021", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17928", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17904", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17869", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17723", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17818", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3876" }, { "reference_url": "http://secunia.com/advisories/42789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42789" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/44630", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44630" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715", "reference_id": "649715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=649715" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876", "reference_id": "CVE-2010-3876", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0004", "reference_id": "RHSA-2011:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1071-1/", "reference_id": "USN-1071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1071-1/" }, { "reference_url": "https://usn.ubuntu.com/1072-1/", "reference_id": "USN-1072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1072-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-1/", "reference_id": "USN-1080-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-1/" }, { "reference_url": "https://usn.ubuntu.com/1080-2/", "reference_id": "USN-1080-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1080-2/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1119-1/", "reference_id": "USN-1119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1119-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-3876" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m6hm-2cau-4fdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87578?format=api", "vulnerability_id": "VCID-mcdj-296n-1kc9", "summary": "kernel: unix socket local dos", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "reference_url": "http://lkml.org/lkml/2010/11/23/395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.org/lkml/2010/11/23/395" }, { "reference_url": "http://lkml.org/lkml/2010/11/23/450", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.org/lkml/2010/11/23/450" }, { "reference_url": "http://lkml.org/lkml/2010/11/25/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.org/lkml/2010/11/25/8" }, { "reference_url": "http://marc.info/?l=linux-netdev&m=129059035929046&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=linux-netdev&m=129059035929046&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4249.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4249.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4249", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23986", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23998", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23946", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23835", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23917", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24977", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24969", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24941", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25118", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25158", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25044", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4249" }, { "reference_url": "http://secunia.com/advisories/42354", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42354" }, { "reference_url": "http://secunia.com/advisories/42745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42745" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.exploit-db.com/exploits/15622/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/15622/" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/11/24/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/11/24/10" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/11/24/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/11/24/2" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45037" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3321", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=656756", "reference_id": "656756", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656756" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4249", "reference_id": "CVE-2010-4249", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4249" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15622.c", "reference_id": "CVE-2010-4249;OSVDB-69527", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15622.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0303", "reference_id": "RHSA-2011:0303", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0303" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0330", "reference_id": "RHSA-2011:0330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "reference_url": "https://usn.ubuntu.com/1054-1/", "reference_id": "USN-1054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1054-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1074-1/", "reference_id": "USN-1074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1074-1/" }, { "reference_url": "https://usn.ubuntu.com/1074-2/", "reference_id": "USN-1074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1074-2/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1111-1/", "reference_id": "USN-1111-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1111-1/" }, { "reference_url": "https://usn.ubuntu.com/1119-1/", "reference_id": "USN-1119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1119-1/" }, { "reference_url": "https://usn.ubuntu.com/1186-1/", "reference_id": "USN-1186-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1186-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4249" ], "risk_score": 8.8, "exploitability": "2.0", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcdj-296n-1kc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87655?format=api", "vulnerability_id": "VCID-nej4-chcw-fqah", "summary": "kernel: ipc/sem.c: reading uninitialized stack memory", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24766", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24954", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25071", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24846", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24914", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24936", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24888", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24809", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24796", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2475", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24627", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24702", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4083" }, { "reference_url": "http://secunia.com/advisories/42778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42778" }, { "reference_url": "http://secunia.com/advisories/42789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42789" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42932" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/43291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43291" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/09/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/09/25/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/06/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/06/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/07/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/25/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/25/3" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/43809", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43809" }, { "reference_url": "http://www.spinics.net/lists/mm-commits/msg80234.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/mm-commits/msg80234.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673", "reference_id": "648673", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648673" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083", "reference_id": "CVE-2010-4083", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0004", "reference_id": "RHSA-2011:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1054-1/", "reference_id": "USN-1054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1054-1/" }, { "reference_url": "https://usn.ubuntu.com/1071-1/", "reference_id": "USN-1071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1071-1/" }, { "reference_url": "https://usn.ubuntu.com/1072-1/", "reference_id": "USN-1072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1072-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1081-1/", "reference_id": "USN-1081-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1081-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1187-1/", "reference_id": "USN-1187-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1187-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4083" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nej4-chcw-fqah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87639?format=api", "vulnerability_id": "VCID-nq55-xn3b-8qdm", "summary": "kernel: ipc/shm.c: reading uninitialized stack memory", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "reference_url": "http://lkml.org/lkml/2010/10/6/454", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lkml.org/lkml/2010/10/6/454" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4072", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21392", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21493", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21663", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21721", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2161", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21533", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21501", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21355", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21352", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21235", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21305", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4072" }, { "reference_url": "http://secunia.com/advisories/42758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42758" }, { "reference_url": "http://secunia.com/advisories/42778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42778" }, { "reference_url": "http://secunia.com/advisories/42884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42884" }, { "reference_url": "http://secunia.com/advisories/42890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42890" }, { "reference_url": "http://secunia.com/advisories/42932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42932" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/43161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43161" }, { "reference_url": "http://secunia.com/advisories/43291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43291" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/07/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/07/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/25/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/25/3" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0017.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/45054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45054" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1041-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1057-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1057-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0070" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0280" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=648656", "reference_id": "648656", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648656" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4072", "reference_id": "CVE-2010-4072", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0007", "reference_id": "RHSA-2011:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0017", "reference_id": "RHSA-2011:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1041-1/", "reference_id": "USN-1041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1041-1/" }, { "reference_url": "https://usn.ubuntu.com/1057-1/", "reference_id": "USN-1057-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1057-1/" }, { "reference_url": "https://usn.ubuntu.com/1072-1/", "reference_id": "USN-1072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1072-1/" }, { "reference_url": "https://usn.ubuntu.com/1074-1/", "reference_id": "USN-1074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1074-1/" }, { "reference_url": "https://usn.ubuntu.com/1074-2/", "reference_id": "USN-1074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1074-2/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1119-1/", "reference_id": "USN-1119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1119-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4072" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nq55-xn3b-8qdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87621?format=api", "vulnerability_id": "VCID-q4p1-vxct-cybq", "summary": "kernel: tipc: heap overflow in tipc_msg_build()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0" }, { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a" }, { "reference_url": "http://marc.info/?l=linux-netdev&m=128770476511716&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=linux-netdev&m=128770476511716&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3859.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3859.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3859", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34636", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35095", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35124", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35075", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35079", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3502", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35043", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34997", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34766", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34747", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34656", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34527", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34598", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3859" }, { "reference_url": "http://secunia.com/advisories/42789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42789" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2126" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:029" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/22/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/22/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/10/22/5" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/44354", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44354" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145247.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145248.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145248.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145262.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145262.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145263.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145263.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145264.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145265.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145265.html" }, { "reference_url": "http://www.spinics.net/lists/netdev/msg145352.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.spinics.net/lists/netdev/msg145352.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645867", "reference_id": "645867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645867" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3859", "reference_id": "CVE-2010-3859", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0004", "reference_id": "RHSA-2011:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1054-1/", "reference_id": "USN-1054-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1054-1/" }, { "reference_url": "https://usn.ubuntu.com/1071-1/", "reference_id": "USN-1071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1071-1/" }, { "reference_url": "https://usn.ubuntu.com/1072-1/", "reference_id": "USN-1072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1072-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" }, { "reference_url": "https://usn.ubuntu.com/1204-1/", "reference_id": "USN-1204-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1204-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-3859" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4p1-vxct-cybq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87600?format=api", "vulnerability_id": "VCID-v5g5-3pv6-dqa4", "summary": "kernel: gdth: integer overflow in ioc_general()", "references": [ { "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" }, { "reference_url": "http://ns3.spinics.net/lists/linux-scsi/msg47361.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ns3.spinics.net/lists/linux-scsi/msg47361.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/09/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/09/1" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/09/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/09/3" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/09/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/09/4" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/09/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/09/5" }, { "reference_url": "http://openwall.com/lists/oss-security/2010/11/10/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2010/11/10/12" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4157", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29367", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29824", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2987", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29917", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29733", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29761", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29695", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29615", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29501", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29293", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29353", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4157" }, { "reference_url": "http://secunia.com/advisories/42745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42745" }, { "reference_url": "http://secunia.com/advisories/42778", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42778" }, { "reference_url": "http://secunia.com/advisories/42789", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42789" }, { "reference_url": "http://secunia.com/advisories/42801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42801" }, { "reference_url": "http://secunia.com/advisories/42932", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42932" }, { "reference_url": "http://secunia.com/advisories/42963", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42963" }, { "reference_url": "http://secunia.com/advisories/43291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43291" }, { "reference_url": "http://secunia.com/advisories/46397", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/46397" }, { "reference_url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0958.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0004.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0162.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/44648", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44648" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3321", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3321" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0012", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0012" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0024" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0124" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0168" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147", "reference_id": "651147", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651147" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157", "reference_id": "CVE-2010-4157", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0958", "reference_id": "RHSA-2010:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0004", "reference_id": "RHSA-2011:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0162", "reference_id": "RHSA-2011:0162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0162" }, { "reference_url": "https://usn.ubuntu.com/1041-1/", "reference_id": "USN-1041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1041-1/" }, { "reference_url": "https://usn.ubuntu.com/1071-1/", "reference_id": "USN-1071-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1071-1/" }, { "reference_url": "https://usn.ubuntu.com/1072-1/", "reference_id": "USN-1072-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1072-1/" }, { "reference_url": "https://usn.ubuntu.com/1073-1/", "reference_id": "USN-1073-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1073-1/" }, { "reference_url": "https://usn.ubuntu.com/1083-1/", "reference_id": "USN-1083-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1083-1/" }, { "reference_url": "https://usn.ubuntu.com/1093-1/", "reference_id": "USN-1093-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1093-1/" }, { "reference_url": "https://usn.ubuntu.com/1164-1/", "reference_id": "USN-1164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1164-1/" }, { "reference_url": "https://usn.ubuntu.com/1202-1/", "reference_id": "USN-1202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1202-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-4157" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v5g5-3pv6-dqa4" } ], "fixing_vulnerabilities": [], "risk_score": "8.8", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.9-89.35.1%3Farch=EL" }