{"url":"http://public2.vulnerablecode.io/api/packages/127555?format=json","purl":"pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47?arch=el5rt","type":"rpm","namespace":"redhat","name":"kernel-rt","version":"2.6.33.7-rt29.47","qualifiers":{"arch":"el5rt"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87607?format=json","vulnerability_id":"VCID-22bx-f76m-e3c1","summary":"kernel: CAN minor heap overflow","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/03/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/03/3"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/04/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/04/4"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/20/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/20/2"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/20/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/20/3"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/20/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/20/4"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/20/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/20/5"},{"reference_url":"http://openwall.com/lists/oss-security/2010/12/21/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/12/21/1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3874.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3874","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26231","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26472","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26434","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26366","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26179","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26247","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26303","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3874"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.spinics.net/lists/netdev/msg145791.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg145791.html"},{"reference_url":"http://www.spinics.net/lists/netdev/msg146469.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg146469.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=649695","reference_id":"649695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=649695"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3874","reference_id":"CVE-2010-3874","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3874"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3874"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22bx-f76m-e3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87606?format=json","vulnerability_id":"VCID-2m8w-7whg-jube","summary":"kernel: logic error in INET_DIAG bytecode auditing","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/05/3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3880.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3880","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31535","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32057","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32184","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32099","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32096","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31671","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31522","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31593","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31603","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31512","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3880"},{"reference_url":"http://secunia.com/advisories/42126","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42126"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44665","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44665"},{"reference_url":"http://www.spinics.net/lists/netdev/msg145899.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg145899.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=651264","reference_id":"651264","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=651264"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3880","reference_id":"CVE-2010-3880","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1071-1/","reference_id":"USN-1071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1071-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3880"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2m8w-7whg-jube"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87636?format=json","vulnerability_id":"VCID-3egz-urd4-yfbw","summary":"kernel: heap contents leak from ETHTOOL_GRXCLSRLALL","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://openwall.com/lists/oss-security/2010/10/25/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/10/25/4"},{"reference_url":"http://openwall.com/lists/oss-security/2010/10/26/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/10/26/1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3861.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3861","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16199","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16313","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16188","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16093","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16086","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16165","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3861"},{"reference_url":"http://secunia.com/advisories/42758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42758"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.securityfocus.com/bid/44427","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44427"},{"reference_url":"http://www.ubuntu.com/usn/USN-1041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1041-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0070","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0070"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=646725","reference_id":"646725","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=646725"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3861","reference_id":"CVE-2010-3861","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3861"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3egz-urd4-yfbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87663?format=json","vulnerability_id":"VCID-519v-6b9u-dygr","summary":"kernel: drivers/serial/serial_core.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862"},{"reference_url":"http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4075","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23736","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23958","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23992","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23619","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23772","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23717","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4075"},{"reference_url":"http://secunia.com/advisories/42884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42884"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/43806","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43806"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648660","reference_id":"648660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648660"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4075","reference_id":"CVE-2010-4075","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0017","reference_id":"RHSA-2011:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1086-1/","reference_id":"USN-1086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1086-1/"},{"reference_url":"https://usn.ubuntu.com/1089-1/","reference_id":"USN-1089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1089-1/"},{"reference_url":"https://usn.ubuntu.com/1090-1/","reference_id":"USN-1090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1090-1/"},{"reference_url":"https://usn.ubuntu.com/1092-1/","reference_id":"USN-1092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1092-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1105-1/","reference_id":"USN-1105-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1105-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4075"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-519v-6b9u-dygr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87653?format=json","vulnerability_id":"VCID-5x5t-fnw6-kqea","summary":"kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lkml.org/lkml/2010/9/25/41","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2010/9/25/41"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4080","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23736","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23958","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23992","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23619","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23772","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23717","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4080"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/42884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42884"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45058","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45058"},{"reference_url":"http://www.securityfocus.com/bid/45063","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45063"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648669","reference_id":"648669","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648669"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4080","reference_id":"CVE-2010-4080","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0017","reference_id":"RHSA-2011:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1071-1/","reference_id":"USN-1071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1071-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4080"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5x5t-fnw6-kqea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87640?format=json","vulnerability_id":"VCID-643a-mvrh-bbap","summary":"kernel: ipc/compat*.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"},{"reference_url":"http://lkml.org/lkml/2010/10/6/492","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2010/10/6/492"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4073","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49477","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49475","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4953","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49495","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49413","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49473","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49501","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4945","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4073"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42884"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/43291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43291"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://securityreason.com/securityalert/8366","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8366"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45073","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45073"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0375","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648658","reference_id":"648658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648658"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4073","reference_id":"CVE-2010-4073","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0017","reference_id":"RHSA-2011:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1186-1/","reference_id":"USN-1186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1186-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4073"],"risk_score":3.4,"exploitability":"2.0","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-643a-mvrh-bbap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87647?format=json","vulnerability_id":"VCID-8fkd-5ked-xyes","summary":"kernel: prevent heap corruption in snd_ctl_new()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3442.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3442","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38644","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39125","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3862","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38693","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38708","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3442"},{"reference_url":"http://secunia.com/advisories/42400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42400"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/43291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43291"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/29/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/29/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/29/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/29/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/29/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/29/9"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0936.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/43787","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43787"},{"reference_url":"http://www.ubuntu.com/usn/USN-1000-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1000-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3113","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3113"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0375","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=638478","reference_id":"638478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=638478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3442","reference_id":"CVE-2010-3442","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0842","reference_id":"RHSA-2010:0842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0936","reference_id":"RHSA-2010:0936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://usn.ubuntu.com/1000-1/","reference_id":"USN-1000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1000-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3442"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkd-5ked-xyes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87597?format=json","vulnerability_id":"VCID-ashs-ew8u-qubr","summary":"kernel: perf bug","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128979684911295&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128979684911295&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=128984344103497&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128984344103497&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4169.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4169","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15092","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15019","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15027","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14922","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14965","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15047","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4169"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/63316","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/63316"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.securityfocus.com/bid/44861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44861"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=651671","reference_id":"651671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=651671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4169","reference_id":"CVE-2010-4169","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0283","reference_id":"RHSA-2011:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0283"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4169"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ashs-ew8u-qubr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87589?format=json","vulnerability_id":"VCID-f744-pabt-7ffu","summary":"kernel: socket filters infoleak","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4158","reference_id":"","reference_type":"","scores":[{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41669","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42028","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41954","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42005","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42035","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42009","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41649","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41735","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41644","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4158"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/42884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42884"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/43291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43291"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/514705","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514705"},{"reference_url":"http://www.securityfocus.com/archive/1/514845","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514845"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44758","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44758"},{"reference_url":"http://www.spinics.net/lists/netdev/msg146361.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/netdev/msg146361.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0375","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=651698","reference_id":"651698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=651698"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4158","reference_id":"CVE-2010-4158","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4158"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c","reference_id":"CVE-2010-4158;OSVDB-69190","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34987.c"},{"reference_url":"https://www.securityfocus.com/bid/44758/info","reference_id":"CVE-2010-4158;OSVDB-69190","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/44758/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0017","reference_id":"RHSA-2011:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1086-1/","reference_id":"USN-1086-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1086-1/"},{"reference_url":"https://usn.ubuntu.com/1089-1/","reference_id":"USN-1089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1089-1/"},{"reference_url":"https://usn.ubuntu.com/1092-1/","reference_id":"USN-1092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1092-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1105-1/","reference_id":"USN-1105-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1105-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4158"],"risk_score":3.8,"exploitability":"2.0","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f744-pabt-7ffu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87644?format=json","vulnerability_id":"VCID-fjh9-4gn3-6feg","summary":"kernel: sctp memory corruption in HMAC handling","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://marc.info/?l=linux-kernel&m=128596992418814&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=linux-kernel&m=128596992418814&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3705.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3705","reference_id":"","reference_type":"","scores":[{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.7902","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79027","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79035","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.7905","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79048","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79082","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79102","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79135","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79152","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.7915","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3705"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/04/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/04/7"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1000-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1000-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=640036","reference_id":"640036","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=640036"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3705","reference_id":"CVE-2010-3705","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0842","reference_id":"RHSA-2010:0842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://usn.ubuntu.com/1000-1/","reference_id":"USN-1000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1000-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3705"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjh9-4gn3-6feg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87667?format=json","vulnerability_id":"VCID-j49x-d5sv-wkek","summary":"kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=405707985594169cfd0b1d97d29fcb4b4c6f2ac9","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=405707985594169cfd0b1d97d29fcb4b4c6f2ac9"},{"reference_url":"http://lkml.org/lkml/2010/9/15/393","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2010/9/15/393"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4079.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4079","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22526","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22704","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22492","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22379","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2251","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4079"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc8","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.securityfocus.com/bid/45062","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45062"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648666","reference_id":"648666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648666"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4079","reference_id":"CVE-2010-4079","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4079"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j49x-d5sv-wkek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87616?format=json","vulnerability_id":"VCID-m6hm-2cau-4fdg","summary":"kernel: net/packet/af_packet.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f"},{"reference_url":"http://marc.info/?l=linux-netdev&m=128854507220908&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=linux-netdev&m=128854507220908&w=2"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/02/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/02/10"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/02/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/02/12"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/02/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/02/7"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/02/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/02/9"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/04/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/04/5"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3876","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17881","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1806","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18037","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1798","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18021","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17904","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17869","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17818","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17919","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3876"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44630","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44630"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=649715","reference_id":"649715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=649715"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3876","reference_id":"CVE-2010-3876","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1071-1/","reference_id":"USN-1071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1071-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1080-1/","reference_id":"USN-1080-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-1/"},{"reference_url":"https://usn.ubuntu.com/1080-2/","reference_id":"USN-1080-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1080-2/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3876"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m6hm-2cau-4fdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87655?format=json","vulnerability_id":"VCID-nej4-chcw-fqah","summary":"kernel: ipc/sem.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4083","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24711","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25032","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24809","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24702","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24766","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24693","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4083"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/43291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43291"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/43809","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43809"},{"reference_url":"http://www.spinics.net/lists/mm-commits/msg80234.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/mm-commits/msg80234.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0375","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648673","reference_id":"648673","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648673"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4083","reference_id":"CVE-2010-4083","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1071-1/","reference_id":"USN-1071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1071-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1081-1/","reference_id":"USN-1081-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1081-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4083"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nej4-chcw-fqah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87639?format=json","vulnerability_id":"VCID-nq55-xn3b-8qdm","summary":"kernel: ipc/shm.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"},{"reference_url":"http://lkml.org/lkml/2010/10/6/454","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2010/10/6/454"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4072","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21389","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21585","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21501","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21355","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21235","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21305","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21369","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4072"},{"reference_url":"http://secunia.com/advisories/42758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42758"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42884"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/43161","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43161"},{"reference_url":"http://secunia.com/advisories/43291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43291"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:029"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:051"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0017.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45054","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45054"},{"reference_url":"http://www.ubuntu.com/usn/USN-1041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1041-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1057-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1057-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0070","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0070"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0280","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0280"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0375","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648656","reference_id":"648656","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648656"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4072","reference_id":"CVE-2010-4072","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0017","reference_id":"RHSA-2011:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1057-1/","reference_id":"USN-1057-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1057-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4072"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nq55-xn3b-8qdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87643?format=json","vulnerability_id":"VCID-pmch-au5t-2fh5","summary":"kernel: arbitrary kernel memory write via i915 GEM ioctl","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2962.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2962","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29829","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30337","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30328","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30284","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30252","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30234","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29797","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29867","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29879","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29809","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2962"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://secunia.com/advisories/42758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42758"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.securityfocus.com/bid/44067","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44067"},{"reference_url":"http://www.ubuntu.com/usn/USN-1041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1041-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0070","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0070"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=637688","reference_id":"637688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=637688"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2962","reference_id":"CVE-2010-2962","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0842","reference_id":"RHSA-2010:0842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1119-1/","reference_id":"USN-1119-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1119-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2962"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pmch-au5t-2fh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87668?format=json","vulnerability_id":"VCID-pqms-kbb2-wua8","summary":"kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03392.html","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03392.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4082.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4082","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21187","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21296","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21314","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21318","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21136","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21035","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21101","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21167","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4082"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.securityfocus.com/bid/43817","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43817"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648671","reference_id":"648671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648671"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4082","reference_id":"CVE-2010-4082","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4082"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1023-1/","reference_id":"USN-1023-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1023-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4082"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pqms-kbb2-wua8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87665?format=json","vulnerability_id":"VCID-rdyv-juby-e3gq","summary":"kernel: drivers/char/nozomi.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d281da7ff6f70efca0553c288bb883e8605b3862"},{"reference_url":"http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03387.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4077","reference_id":"","reference_type":"","scores":[{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65263","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65151","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65179","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65173","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.652","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65227","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65272","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65241","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4077"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://securityreason.com/securityalert/8129","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8129"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.securityfocus.com/bid/45059","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45059"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648663","reference_id":"648663","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648663"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16973.c","reference_id":"CVE-2010-4077","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/16973.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4077","reference_id":"CVE-2010-4077","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1089-1/","reference_id":"USN-1089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1089-1/"},{"reference_url":"https://usn.ubuntu.com/1092-1/","reference_id":"USN-1092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1092-1/"},{"reference_url":"https://usn.ubuntu.com/1170-1/","reference_id":"USN-1170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1170-1/"},{"reference_url":"https://usn.ubuntu.com/1183-1/","reference_id":"USN-1183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1183-1/"},{"reference_url":"https://usn.ubuntu.com/1187-1/","reference_id":"USN-1187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1187-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"},{"reference_url":"https://usn.ubuntu.com/1203-1/","reference_id":"USN-1203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1203-1/"},{"reference_url":"https://usn.ubuntu.com/1204-1/","reference_id":"USN-1204-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1204-1/"},{"reference_url":"https://usn.ubuntu.com/1208-1/","reference_id":"USN-1208-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1208-1/"},{"reference_url":"https://usn.ubuntu.com/1216-1/","reference_id":"USN-1216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1216-1/"},{"reference_url":"https://usn.ubuntu.com/1218-1/","reference_id":"USN-1218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1218-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4077"],"risk_score":3.4,"exploitability":"2.0","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rdyv-juby-e3gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87707?format=json","vulnerability_id":"VCID-t5zj-36y8-bbdt","summary":"kernel: setup_arg_pages: diagnose excessive argument size","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583"},{"reference_url":"http://grsecurity.net/~spender/64bit_dos.c","reference_id":"","reference_type":"","scores":[],"url":"http://grsecurity.net/~spender/64bit_dos.c"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3858.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3858","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34824","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35341","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34909","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34784","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34858","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34894","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34798","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3858"},{"reference_url":"http://secunia.com/advisories/42758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42758"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.exploit-db.com/exploits/15619","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/15619"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:257"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/21/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/21/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/22/4"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44301","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44301"},{"reference_url":"http://www.ubuntu.com/usn/USN-1041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1041-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0070","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0070"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=645222","reference_id":"645222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=645222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3858","reference_id":"CVE-2010-3858","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3858"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15619.c","reference_id":"CVE-2010-4243;OSVDB-70659;CVE-2010-3858;OSVDB-69551","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15619.c"},{"reference_url":"https://www.securityfocus.com/bid/44301/info","reference_id":"CVE-2010-4243;OSVDB-70659;CVE-2010-3858;OSVDB-69551","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/44301/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0836","reference_id":"RHSA-2011:0836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0836"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3858"],"risk_score":8.8,"exploitability":"2.0","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t5zj-36y8-bbdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87600?format=json","vulnerability_id":"VCID-v5g5-3pv6-dqa4","summary":"kernel: gdth: integer overflow in ioc_general()","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html"},{"reference_url":"http://ns3.spinics.net/lists/linux-scsi/msg47361.html","reference_id":"","reference_type":"","scores":[],"url":"http://ns3.spinics.net/lists/linux-scsi/msg47361.html"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/09/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/09/1"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/09/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/09/3"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/09/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/09/4"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/09/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/09/5"},{"reference_url":"http://openwall.com/lists/oss-security/2010/11/10/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2010/11/10/12"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4157","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29309","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29824","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29794","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29695","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29501","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29293","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29353","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29288","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4157"},{"reference_url":"http://secunia.com/advisories/42745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42745"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/42801","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42801"},{"reference_url":"http://secunia.com/advisories/42932","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42932"},{"reference_url":"http://secunia.com/advisories/42963","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42963"},{"reference_url":"http://secunia.com/advisories/43291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43291"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0162.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44648","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44648"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3321","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3321"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0124","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0124"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0168","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0168"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0375","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0375"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=651147","reference_id":"651147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=651147"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4157","reference_id":"CVE-2010-4157","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0162","reference_id":"RHSA-2011:0162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0162"},{"reference_url":"https://usn.ubuntu.com/1041-1/","reference_id":"USN-1041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1041-1/"},{"reference_url":"https://usn.ubuntu.com/1071-1/","reference_id":"USN-1071-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1071-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"},{"reference_url":"https://usn.ubuntu.com/1164-1/","reference_id":"USN-1164-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1164-1/"},{"reference_url":"https://usn.ubuntu.com/1202-1/","reference_id":"USN-1202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1202-1/"}],"fixed_packages":[],"aliases":["CVE-2010-4157"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v5g5-3pv6-dqa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87661?format=json","vulnerability_id":"VCID-vwj3-5b6z-17b1","summary":"kernel: sctp: do not reset the packet during sctp_packet_config","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4bdab43323b459900578b200a4b8cf9713ac8fab"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html"},{"reference_url":"http://marc.info/?l=linux-netdev&m=128453869227715&w=3","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=linux-netdev&m=128453869227715&w=3"},{"reference_url":"http://marc.info/?l=oss-security&m=128534569803598&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128534569803598&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=128537701808336&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128537701808336&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3432.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3432","reference_id":"","reference_type":"","scores":[{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88981","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.8888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88923","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.8892","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88951","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88978","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04322","scoring_system":"epss","scoring_elements":"0.88971","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3432"},{"reference_url":"http://secunia.com/advisories/42400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42400"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"http://secunia.com/advisories/42789","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42789"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.6"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0842.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0936.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0004.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/43480","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43480"},{"reference_url":"http://www.ubuntu.com/usn/USN-1000-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1000-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3113","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3113"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0024","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0024"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0298","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=637675","reference_id":"637675","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=637675"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3432","reference_id":"CVE-2010-3432","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0842","reference_id":"RHSA-2010:0842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0936","reference_id":"RHSA-2010:0936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0004","reference_id":"RHSA-2011:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0004"},{"reference_url":"https://usn.ubuntu.com/1000-1/","reference_id":"USN-1000-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1000-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"},{"reference_url":"https://usn.ubuntu.com/1093-1/","reference_id":"USN-1093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1093-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3432"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwj3-5b6z-17b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87662?format=json","vulnerability_id":"VCID-zwvt-5gfz-suda","summary":"kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory","references":[{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a0846f1868b11cd827bdfeaf4527d8b1b1c0b098","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a0846f1868b11cd827bdfeaf4527d8b1b1c0b098"},{"reference_url":"http://lkml.org/lkml/2010/9/15/392","reference_id":"","reference_type":"","scores":[],"url":"http://lkml.org/lkml/2010/9/15/392"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4074.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4074","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22526","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22704","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22492","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22379","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2251","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4074"},{"reference_url":"http://secunia.com/advisories/42890","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42890"},{"reference_url":"http://www.debian.org/security/2010/dsa-2126","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2126"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/09/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/09/25/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/06/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/06/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/25/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/25/3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0958.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0007.html"},{"reference_url":"http://www.securityfocus.com/bid/45074","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=648659","reference_id":"648659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=648659"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4074","reference_id":"CVE-2010-4074","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0958","reference_id":"RHSA-2010:0958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0007","reference_id":"RHSA-2011:0007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0007"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1074-1/","reference_id":"USN-1074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-1/"},{"reference_url":"https://usn.ubuntu.com/1074-2/","reference_id":"USN-1074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1074-2/"}],"fixed_packages":[],"aliases":["CVE-2010-4074"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zwvt-5gfz-suda"}],"fixing_vulnerabilities":[],"risk_score":"8.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.47%3Farch=el5rt"}