Search for vulnerabilities
Vulnerability details: VCID-a61m-1sk9-aaaj
Vulnerability ID VCID-a61m-1sk9-aaaj
Aliases CVE-2010-0434
Summary The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0168
rhas Low https://access.redhat.com/errata/RHSA-2010:0175
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0396
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0602
epss 0.00242 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00242 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00242 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00242 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00242 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.02554 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.03217 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.03217 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.03217 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.03217 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.03217 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
epss 0.04585 https://api.first.org/data/v1/epss?cve=CVE-2010-0434
apache_httpd low https://httpd.apache.org/security/json/CVE-2010-0434.json
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2010-0434
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
Reference id Reference type URL
http://httpd.apache.org/security/vulnerabilities_22.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://lists.vmware.com/pipermail/security-announce/2010/000105.html
http://marc.info/?l=bugtraq&m=127557640302499&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0434.json
https://api.first.org/data/v1/epss?cve=CVE-2010-0434
https://bugzilla.redhat.com/show_bug.cgi?id=570171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434
http://secunia.com/advisories/39100
http://secunia.com/advisories/39115
http://secunia.com/advisories/39501
http://secunia.com/advisories/39628
http://secunia.com/advisories/39632
http://secunia.com/advisories/39656
http://secunia.com/advisories/40096
https://exchange.xforce.ibmcloud.com/vulnerabilities/56625
https://issues.apache.org/bugzilla/show_bug.cgi?id=48359
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10358
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8695
http://support.apple.com/kb/HT4435
http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h
http://svn.apache.org/viewvc?view=revision&revision=917867
http://svn.apache.org/viewvc?view=revision&revision=918427
http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939
http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
http://www-01.ibm.com/support/docview.wss?uid=swg1PM15829
http://www.debian.org/security/2010/dsa-2035
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
http://www.redhat.com/support/errata/RHSA-2010-0168.html
http://www.redhat.com/support/errata/RHSA-2010-0175.html
http://www.securityfocus.com/bid/38494
http://www.vmware.com/security/advisories/VMSA-2010-0014.html
http://www.vupen.com/english/advisories/2010/0911
http://www.vupen.com/english/advisories/2010/0994
http://www.vupen.com/english/advisories/2010/1001
http://www.vupen.com/english/advisories/2010/1057
http://www.vupen.com/english/advisories/2010/1411
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
CVE-2010-0434 https://httpd.apache.org/security/json/CVE-2010-0434.json
CVE-2010-0434 https://nvd.nist.gov/vuln/detail/CVE-2010-0434
GLSA-201206-25 https://security.gentoo.org/glsa/201206-25
RHSA-2010:0168 https://access.redhat.com/errata/RHSA-2010:0168
RHSA-2010:0175 https://access.redhat.com/errata/RHSA-2010:0175
RHSA-2010:0396 https://access.redhat.com/errata/RHSA-2010:0396
RHSA-2010:0602 https://access.redhat.com/errata/RHSA-2010:0602
USN-908-1 https://usn.ubuntu.com/908-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2010-0434
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.64656
EPSS Score 0.00242
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.