Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/libvirt@0.9.10-21.el6_3?arch=8
Typerpm
Namespaceredhat
Namelibvirt
Version0.9.10-21.el6_3
Qualifiers
arch 8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-dyw1-b4w5-3bhe
vulnerability_id VCID-dyw1-b4w5-3bhe
summary GlusterFS: insecure temporary file creation
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5635.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5635.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5635
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18574
published_at 2026-04-24T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.1875
published_at 2026-04-01T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18886
published_at 2026-04-02T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18938
published_at 2026-04-04T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18661
published_at 2026-04-07T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18741
published_at 2026-04-08T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18794
published_at 2026-04-09T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18799
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18753
published_at 2026-04-12T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18703
published_at 2026-04-13T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18652
published_at 2026-04-16T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18664
published_at 2026-04-18T12:55:00Z
12
value 0.0006
scoring_system epss
scoring_elements 0.18683
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5635
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704944
reference_id 704944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=886364
reference_id 886364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=886364
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5635
reference_id CVE-2012-5635
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-5635
fixed_packages
aliases CVE-2012-5635
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyw1-b4w5-3bhe
1
url VCID-gmyn-vg39-q3bv
vulnerability_id VCID-gmyn-vg39-q3bv
summary
Multiple vulnerabilities have been found in libvirt, allowing
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720
reference_id
reference_type
scores
url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720
1
reference_url http://libvirt.org/news.html
reference_id
reference_type
scores
url http://libvirt.org/news.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
8
reference_url http://osvdb.org/89644
reference_id
reference_type
scores
url http://osvdb.org/89644
9
reference_url http://rhn.redhat.com/errata/RHSA-2013-0199.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0199.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0170.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0170.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0170
reference_id
reference_type
scores
0
value 0.2022
scoring_system epss
scoring_elements 0.95523
published_at 2026-04-24T12:55:00Z
1
value 0.2022
scoring_system epss
scoring_elements 0.95469
published_at 2026-04-01T12:55:00Z
2
value 0.2022
scoring_system epss
scoring_elements 0.95478
published_at 2026-04-02T12:55:00Z
3
value 0.2022
scoring_system epss
scoring_elements 0.95484
published_at 2026-04-04T12:55:00Z
4
value 0.2022
scoring_system epss
scoring_elements 0.95489
published_at 2026-04-07T12:55:00Z
5
value 0.2022
scoring_system epss
scoring_elements 0.95495
published_at 2026-04-08T12:55:00Z
6
value 0.2022
scoring_system epss
scoring_elements 0.95498
published_at 2026-04-09T12:55:00Z
7
value 0.2022
scoring_system epss
scoring_elements 0.95503
published_at 2026-04-11T12:55:00Z
8
value 0.2022
scoring_system epss
scoring_elements 0.95505
published_at 2026-04-13T12:55:00Z
9
value 0.2022
scoring_system epss
scoring_elements 0.95514
published_at 2026-04-16T12:55:00Z
10
value 0.2022
scoring_system epss
scoring_elements 0.9552
published_at 2026-04-18T12:55:00Z
11
value 0.2022
scoring_system epss
scoring_elements 0.95522
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0170
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170
13
reference_url http://secunia.com/advisories/52001
reference_id
reference_type
scores
url http://secunia.com/advisories/52001
14
reference_url http://secunia.com/advisories/52003
reference_id
reference_type
scores
url http://secunia.com/advisories/52003
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/81552
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/81552
16
reference_url http://wiki.libvirt.org/page/Maintenance_Releases
reference_id
reference_type
scores
url http://wiki.libvirt.org/page/Maintenance_Releases
17
reference_url http://www.securityfocus.com/bid/57578
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57578
18
reference_url http://www.securitytracker.com/id/1028047
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028047
19
reference_url http://www.ubuntu.com/usn/USN-1708-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1708-1
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699224
reference_id 699224
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699224
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=893450
reference_id 893450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=893450
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0170
reference_id CVE-2013-0170
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0170
38
reference_url https://security.gentoo.org/glsa/201309-18
reference_id GLSA-201309-18
reference_type
scores
url https://security.gentoo.org/glsa/201309-18
39
reference_url https://access.redhat.com/errata/RHSA-2013:0199
reference_id RHSA-2013:0199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0199
40
reference_url https://usn.ubuntu.com/1708-1/
reference_id USN-1708-1
reference_type
scores
url https://usn.ubuntu.com/1708-1/
fixed_packages
aliases CVE-2013-0170
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmyn-vg39-q3bv
2
url VCID-n6wn-8uvv-xqb4
vulnerability_id VCID-n6wn-8uvv-xqb4
summary sanlock world writable /var/log/sanlock.log
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5638.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5638.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5638
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12465
published_at 2026-04-24T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12462
published_at 2026-04-01T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12566
published_at 2026-04-02T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12608
published_at 2026-04-04T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12416
published_at 2026-04-07T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12497
published_at 2026-04-08T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12549
published_at 2026-04-09T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12519
published_at 2026-04-11T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.1248
published_at 2026-04-12T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12439
published_at 2026-04-13T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12343
published_at 2026-04-16T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12346
published_at 2026-04-18T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12461
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5638
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5638
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696424
reference_id 696424
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696424
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=887010
reference_id 887010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=887010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5638
reference_id CVE-2012-5638
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5638
fixed_packages
aliases CVE-2012-5638
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6wn-8uvv-xqb4
3
url VCID-wf91-36ce-hbcz
vulnerability_id VCID-wf91-36ce-hbcz
summary
OpenStack Object Storage (swift) Code Injection vulnerability
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1379.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2012-1379.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
3
reference_url https://access.redhat.com/errata/RHSA-2012:1379
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1379
4
reference_url https://access.redhat.com/errata/RHSA-2013:0691
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:0691
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
6
reference_url https://access.redhat.com/security/cve/CVE-2012-4406
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4406
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
reference_id
reference_type
scores
0
value 0.0471
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-04T12:55:00Z
1
value 0.0471
scoring_system epss
scoring_elements 0.89333
published_at 2026-04-02T12:55:00Z
2
value 0.0471
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-01T12:55:00Z
3
value 0.0471
scoring_system epss
scoring_elements 0.89399
published_at 2026-04-24T12:55:00Z
4
value 0.0471
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-13T12:55:00Z
5
value 0.0471
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-12T12:55:00Z
6
value 0.0471
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-11T12:55:00Z
7
value 0.0471
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-09T12:55:00Z
8
value 0.0471
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-08T12:55:00Z
9
value 0.0471
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-07T12:55:00Z
10
value 0.0471
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-18T12:55:00Z
11
value 0.0471
scoring_system epss
scoring_elements 0.89382
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
8
reference_url https://bugs.launchpad.net/swift/+bug/1006414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1006414
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854757
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=854757
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
12
reference_url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
13
reference_url https://launchpad.net/swift/+milestone/1.7.0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://launchpad.net/swift/+milestone/1.7.0
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
15
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
16
reference_url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/16
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/16
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/4
19
reference_url http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/55420
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
reference_id 686812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
29
reference_url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
reference_id GHSA-v7mh-3jgf-r26c
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
30
reference_url https://usn.ubuntu.com/1887-1/
reference_id USN-1887-1
reference_type
scores
url https://usn.ubuntu.com/1887-1/
fixed_packages
aliases CVE-2012-4406, GHSA-v7mh-3jgf-r26c
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wf91-36ce-hbcz
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libvirt@0.9.10-21.el6_3%3Farch=8