Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nodejs-supervisor@0.4.1-2?arch=el6op
Typerpm
Namespaceredhat
Namenodejs-supervisor
Version0.4.1-2
Qualifiers
arch el6op
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-rrwv-dzq7-9ybd
vulnerability_id VCID-rrwv-dzq7-9ybd
summary
Jenkins Cross-Site Request Forgery vulnerabilities
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
references
0
reference_url https://access.redhat.com/errata/RHEA-2013:1032
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHEA-2013:1032
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2034.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2034.json
2
reference_url https://access.redhat.com/security/cve/CVE-2013-2034
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-2034
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2034
reference_id
reference_type
scores
0
value 0.00332
scoring_system epss
scoring_elements 0.5613
published_at 2026-04-18T12:55:00Z
1
value 0.00332
scoring_system epss
scoring_elements 0.56065
published_at 2026-04-07T12:55:00Z
2
value 0.00332
scoring_system epss
scoring_elements 0.56117
published_at 2026-04-08T12:55:00Z
3
value 0.00332
scoring_system epss
scoring_elements 0.56122
published_at 2026-04-09T12:55:00Z
4
value 0.00332
scoring_system epss
scoring_elements 0.56133
published_at 2026-04-11T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.5611
published_at 2026-04-12T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56093
published_at 2026-04-13T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56128
published_at 2026-04-16T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.55955
published_at 2026-04-01T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56066
published_at 2026-04-02T12:55:00Z
10
value 0.00332
scoring_system epss
scoring_elements 0.56086
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2034
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=958958
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=958958
5
reference_url https://issues.jenkins-ci.org/browse/SECURITY-63
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jenkins-ci.org/browse/SECURITY-63
6
reference_url https://issues.jenkins-ci.org/browse/SECURITY-69
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jenkins-ci.org/browse/SECURITY-69
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2034
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2034
8
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
9
reference_url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
10
reference_url https://github.com/advisories/GHSA-fg4r-f9j2-36mw
reference_id GHSA-fg4r-f9j2-36mw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fg4r-f9j2-36mw
fixed_packages
aliases CVE-2013-2034, GHSA-fg4r-f9j2-36mw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rrwv-dzq7-9ybd
1
url VCID-xenc-mfdw-mucm
vulnerability_id VCID-xenc-mfdw-mucm
summary stapler-adjunct-zeroclipboard: XSS via copying XSS payload into buffer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1808
reference_id
reference_type
scores
0
value 0.01651
scoring_system epss
scoring_elements 0.81947
published_at 2026-04-01T12:55:00Z
1
value 0.01651
scoring_system epss
scoring_elements 0.82013
published_at 2026-04-09T12:55:00Z
2
value 0.01651
scoring_system epss
scoring_elements 0.82032
published_at 2026-04-11T12:55:00Z
3
value 0.01651
scoring_system epss
scoring_elements 0.82022
published_at 2026-04-12T12:55:00Z
4
value 0.01651
scoring_system epss
scoring_elements 0.81959
published_at 2026-04-02T12:55:00Z
5
value 0.01651
scoring_system epss
scoring_elements 0.81982
published_at 2026-04-04T12:55:00Z
6
value 0.01651
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-07T12:55:00Z
7
value 0.01651
scoring_system epss
scoring_elements 0.82005
published_at 2026-04-08T12:55:00Z
8
value 0.01856
scoring_system epss
scoring_elements 0.83067
published_at 2026-04-18T12:55:00Z
9
value 0.01856
scoring_system epss
scoring_elements 0.83029
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1808
3
reference_url http://seclists.org/fulldisclosure/2013/Apr/87
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2013/Apr/87
4
reference_url http://seclists.org/fulldisclosure/2013/Apr/88
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2013/Apr/88
5
reference_url http://seclists.org/fulldisclosure/2013/Feb/103
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2013/Feb/103
6
reference_url http://seclists.org/fulldisclosure/2013/Feb/109
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2013/Feb/109
7
reference_url http://seclists.org/fulldisclosure/2013/Mar/5
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2013/Mar/5
8
reference_url http://securityvulns.ru/docs29103.html
reference_id
reference_type
scores
url http://securityvulns.ru/docs29103.html
9
reference_url http://securityvulns.ru/docs29104.html
reference_id
reference_type
scores
url http://securityvulns.ru/docs29104.html
10
reference_url http://securityvulns.ru/docs29105.html
reference_id
reference_type
scores
url http://securityvulns.ru/docs29105.html
11
reference_url https://github.com/jonrohan/ZeroClipboard/blob/master/docs/releases.md#zeroclipboard-108
reference_id
reference_type
scores
url https://github.com/jonrohan/ZeroClipboard/blob/master/docs/releases.md#zeroclipboard-108
12
reference_url https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696
reference_id
reference_type
scores
url https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696
13
reference_url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
reference_id
reference_type
scores
url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
14
reference_url http://www.openwall.com/lists/oss-security/2013/03/03/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/03/03/3
15
reference_url http://www.openwall.com/lists/oss-security/2013/03/10/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/03/10/2
16
reference_url http://www.openwall.com/lists/oss-security/2013/03/25/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/03/25/1
17
reference_url http://www.openwall.com/lists/oss-security/2013/03/26/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/03/26/8
18
reference_url http://www.securityfocus.com/bid/58257
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58257
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=918054
reference_id 918054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=918054
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zeroclipboard_project:zeroclipboard:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zeroclipboard_project:zeroclipboard:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zeroclipboard_project:zeroclipboard:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zeroclipboard_project:zeroclipboard:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zeroclipboard_project:zeroclipboard:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zeroclipboard_project:zeroclipboard:1.0.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1808
reference_id CVE-2013-1808
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1808
fixed_packages
aliases CVE-2013-1808
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xenc-mfdw-mucm
2
url VCID-z46p-c93u-auav
vulnerability_id VCID-z46p-c93u-auav
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-2033 Jenkins: Build Description XSS
references
0
reference_url https://access.redhat.com/errata/RHEA-2013:1032
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHEA-2013:1032
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2033.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2033.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2033
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39392
published_at 2026-04-09T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-08T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39403
published_at 2026-04-11T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39369
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39398
published_at 2026-04-16T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39346
published_at 2026-04-13T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39209
published_at 2026-04-01T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-02T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39364
published_at 2026-04-12T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39406
published_at 2026-04-04T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.3932
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2033
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=958957
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=958957
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/84004
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/84004
5
reference_url https://issues.jenkins-ci.org/browse/SECURITY-67
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jenkins-ci.org/browse/SECURITY-67
6
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
7
reference_url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
8
reference_url https://access.redhat.com/security/cve/CVE-2013-2033
reference_id CVE-2013-2033
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-2033
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2033
reference_id CVE-2013-2033
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2033
10
reference_url https://github.com/advisories/GHSA-826f-32qm-vm3j
reference_id GHSA-826f-32qm-vm3j
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-826f-32qm-vm3j
fixed_packages
aliases CVE-2013-2033, GHSA-826f-32qm-vm3j
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z46p-c93u-auav
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs-supervisor@0.4.1-2%3Farch=el6op