{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87696?format=json","vulnerability_id":"VCID-sdvn-1ttj-hfd5","summary":"kvm: vmx null pointer dereference","aliases":[{"alias":"CVE-2010-0435"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/127712?format=json","purl":"pkg:rpm/redhat/kvm@83-164.el5_5?arch=21","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-sdvn-1ttj-hfd5"},{"vulnerability":"VCID-wpm7-4y7f-myhb"},{"vulnerability":"VCID-z6xx-p5ww-ebgk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kvm@83-164.el5_5%3Farch=21"},{"url":"http://public2.vulnerablecode.io/api/packages/127711?format=json","purl":"pkg:rpm/redhat/rhev-hypervisor@5.5-2.2.6.1?arch=el5_5rhev2_2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a47a-xzem-7yg1"},{"vulnerability":"VCID-sdvn-1ttj-hfd5"},{"vulnerability":"VCID-wpm7-4y7f-myhb"},{"vulnerability":"VCID-xena-ukw7-x7ab"},{"vulnerability":"VCID-z6xx-p5ww-ebgk"},{"vulnerability":"VCID-z8bc-51qw-tues"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhev-hypervisor@5.5-2.2.6.1%3Farch=el5_5rhev2_2"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0435.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0435","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16676","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16556","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0435"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=570528","reference_id":"570528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=570528"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0435","reference_id":"CVE-2010-0435","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0627","reference_id":"RHSA-2010:0627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0627"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"}],"weaknesses":[{"cwe_id":476,"name":"NULL Pointer Dereference","description":"A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit."}],"exploits":[],"severity_range_score":"4.6 - 4.6","exploitability":"0.5","weighted_severity":"4.1","risk_score":2.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sdvn-1ttj-hfd5"}