Search for vulnerabilities
Vulnerability details: VCID-jn3d-ekhp-aaar
Vulnerability ID VCID-jn3d-ekhp-aaar
Aliases CVE-2010-4336
Summary The cu_rrd_create_file function (src/utils_rrdcreate.c) in collectd 4.x before 4.9.4 and before 4.10.2 allow remote attackers to cause a denial of service (assertion failure) via a packet with a timestamp whose value is 10 or less, as demonstrated by creating RRD files using the (1) RRDtool and (2) RRDCacheD plugins.
Status Published
Exploitability 0.5
Weighted Severity 4.5
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.01657 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.05486 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.06223 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.06223 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.06223 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
epss 0.06223 https://api.first.org/data/v1/epss?cve=CVE-2010-4336
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2010-4336
Reference id Reference type URL
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605092
http://collectd.org/news.shtml#news86
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052875.html
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
https://api.first.org/data/v1/epss?cve=CVE-2010-4336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4336
http://secunia.com/advisories/42393
http://secunia.com/advisories/42491
http://secunia.com/advisories/42846
http://www.debian.org/security/2010/dsa-2133
http://www.securityfocus.com/bid/45075
http://www.vupen.com/english/advisories/2010/3196
http://www.vupen.com/english/advisories/2011/0041
605092 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605092
cpe:2.3:a:collectd:collectd:4.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.10:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.10.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.5.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.5.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.7.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.3:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.4:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.8.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.5:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.0:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.1:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.2:*:*:*:*:*:*:*
cpe:2.3:a:collectd:collectd:4.9.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.3:*:*:*:*:*:*:*
CVE-2010-4336 https://nvd.nist.gov/vuln/detail/CVE-2010-4336
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-4336
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.80367
EPSS Score 0.01657
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.