{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33706?format=json","vulnerability_id":"VCID-xp1f-4p3v-67ad","summary":"Multiple vulnerabilities have been found in CUPS, some of which may\n    allow execution of arbitrary code or local privilege escalation.","aliases":[{"alias":"CVE-2010-2941"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583703?format=json","purl":"pkg:deb/debian/cups@1.4.4-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/571553?format=json","purl":"pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-48ht-j7ga-9ugq"},{"vulnerability":"VCID-4bxg-5tnm-y3hw"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-843p-8xve-nfer"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-mcmb-bvw9-dba5"},{"vulnerability":"VCID-mtzd-538p-kbhm"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-y7a9-2p1n-z7fx"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/73457?format=json","purl":"pkg:ebuild/net-print/cups@1.4.8-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.4.8-r1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571552?format=json","purl":"pkg:deb/debian/cups@1.3.8-1%2Blenny10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-2weh-q66p-8bdg"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-48ht-j7ga-9ugq"},{"vulnerability":"VCID-4bxg-5tnm-y3hw"},{"vulnerability":"VCID-4he8-q3nc-3bf7"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7gbc-682w-5fdq"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-843p-8xve-nfer"},{"vulnerability":"VCID-8yv6-g189-vugt"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bj8b-t1mc-zfd3"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-fpbv-zqer-w7c3"},{"vulnerability":"VCID-g2x8-pm39-sfer"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-mcmb-bvw9-dba5"},{"vulnerability":"VCID-mp2s-4x2a-h7fq"},{"vulnerability":"VCID-mtwe-dgnd-c3fj"},{"vulnerability":"VCID-mtzd-538p-kbhm"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qjzr-avt1-fyfd"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-uqp7-5pb9-w7cg"},{"vulnerability":"VCID-ur43-jbhj-k7bk"},{"vulnerability":"VCID-vmjh-9kbz-qkh6"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-xp1f-4p3v-67ad"},{"vulnerability":"VCID-y7a9-2p1n-z7fx"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zm2g-nduw-tfcy"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.3.8-1%252Blenny10"},{"url":"http://public2.vulnerablecode.io/api/packages/127575?format=json","purl":"pkg:rpm/redhat/cups@1:1.3.7-18.el5_5?arch=8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-fpbv-zqer-w7c3"},{"vulnerability":"VCID-xp1f-4p3v-67ad"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.3.7-18.el5_5%3Farch=8"},{"url":"http://public2.vulnerablecode.io/api/packages/127576?format=json","purl":"pkg:rpm/redhat/cups@1:1.4.2-35.el6_0?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xp1f-4p3v-67ad"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.4.2-35.el6_0%3Farch=1"}],"references":[{"reference_url":"http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox","reference_id":"","reference_type":"","scores":[],"url":"http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2010-0811.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2010-0811.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2941","reference_id":"","reference_type":"","scores":[{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95756","published_at":"2026-05-16T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95754","published_at":"2026-05-15T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95707","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.9573","published_at":"2026-05-09T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95736","published_at":"2026-05-11T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.21353","scoring_system":"epss","scoring_elements":"0.95753","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941"},{"reference_url":"http://secunia.com/advisories/42287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42287"},{"reference_url":"http://secunia.com/advisories/42867","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42867"},{"reference_url":"http://secunia.com/advisories/43521","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43521"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201207-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201207-10.xml"},{"reference_url":"http://securitytracker.com/id?1024662","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024662"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/62882","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/62882"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2011/dsa-2176","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2176"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:232","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:232"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:233"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:234","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:234"},{"reference_url":"http://www.osvdb.org/68951","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/68951"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0866.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0866.html"},{"reference_url":"http://www.securityfocus.com/bid/44530","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44530"},{"reference_url":"http://www.ubuntu.com/usn/USN-1012-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1012-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2856","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2856"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3042","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3042"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3088","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3088"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0061","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0061"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0535","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0535"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344","reference_id":"603344","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=624438","reference_id":"624438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=624438"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2941","reference_id":"CVE-2010-2941","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2941"},{"reference_url":"https://security.gentoo.org/glsa/201207-10","reference_id":"GLSA-201207-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201207-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0811","reference_id":"RHSA-2010:0811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0866","reference_id":"RHSA-2010:0866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0866"},{"reference_url":"https://usn.ubuntu.com/1012-1/","reference_id":"USN-1012-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1012-1/"}],"weaknesses":[{"cwe_id":416,"name":"Use After Free","description":"Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."}],"exploits":[],"severity_range_score":"9.3 - 9.8","exploitability":"0.5","weighted_severity":"8.8","risk_score":4.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xp1f-4p3v-67ad"}