Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el6
Typerpm
Namespaceredhat
Nameglusterfs
Version3.3.0.7rhs-1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-dyw1-b4w5-3bhe
vulnerability_id VCID-dyw1-b4w5-3bhe
summary GlusterFS: insecure temporary file creation
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5635.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5635.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5635
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18664
published_at 2026-04-18T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.1875
published_at 2026-04-01T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18886
published_at 2026-04-02T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18938
published_at 2026-04-04T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18661
published_at 2026-04-07T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18741
published_at 2026-04-08T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18794
published_at 2026-04-09T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18799
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18753
published_at 2026-04-12T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18703
published_at 2026-04-13T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18652
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5635
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5635
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704944
reference_id 704944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=886364
reference_id 886364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=886364
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5635
reference_id CVE-2012-5635
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-5635
fixed_packages
aliases CVE-2012-5635
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyw1-b4w5-3bhe
1
url VCID-n6wn-8uvv-xqb4
vulnerability_id VCID-n6wn-8uvv-xqb4
summary sanlock world writable /var/log/sanlock.log
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5638.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5638.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5638
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12346
published_at 2026-04-18T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12462
published_at 2026-04-01T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12566
published_at 2026-04-02T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12608
published_at 2026-04-04T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12416
published_at 2026-04-07T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12497
published_at 2026-04-08T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12549
published_at 2026-04-09T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12519
published_at 2026-04-11T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.1248
published_at 2026-04-12T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12439
published_at 2026-04-13T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12343
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5638
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5638
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696424
reference_id 696424
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696424
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=887010
reference_id 887010
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=887010
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5638
reference_id CVE-2012-5638
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5638
fixed_packages
aliases CVE-2012-5638
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6wn-8uvv-xqb4
2
url VCID-wf91-36ce-hbcz
vulnerability_id VCID-wf91-36ce-hbcz
summary
OpenStack Object Storage (swift) Code Injection vulnerability
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1379.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2012-1379.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
3
reference_url https://access.redhat.com/errata/RHSA-2012:1379
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1379
4
reference_url https://access.redhat.com/errata/RHSA-2013:0691
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:0691
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
6
reference_url https://access.redhat.com/security/cve/CVE-2012-4406
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4406
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
reference_id
reference_type
scores
0
value 0.0471
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-18T12:55:00Z
1
value 0.0471
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-12T12:55:00Z
2
value 0.0471
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-11T12:55:00Z
3
value 0.0471
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-09T12:55:00Z
4
value 0.0471
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-08T12:55:00Z
5
value 0.0471
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-07T12:55:00Z
6
value 0.0471
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-04T12:55:00Z
7
value 0.0471
scoring_system epss
scoring_elements 0.89333
published_at 2026-04-02T12:55:00Z
8
value 0.0471
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-01T12:55:00Z
9
value 0.0471
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
8
reference_url https://bugs.launchpad.net/swift/+bug/1006414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1006414
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854757
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=854757
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
12
reference_url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
13
reference_url https://launchpad.net/swift/+milestone/1.7.0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://launchpad.net/swift/+milestone/1.7.0
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
15
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
16
reference_url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/16
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/16
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/4
19
reference_url http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/55420
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
reference_id 686812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
29
reference_url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
reference_id GHSA-v7mh-3jgf-r26c
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
30
reference_url https://usn.ubuntu.com/1887-1/
reference_id USN-1887-1
reference_type
scores
url https://usn.ubuntu.com/1887-1/
fixed_packages
aliases CVE-2012-4406, GHSA-v7mh-3jgf-r26c
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wf91-36ce-hbcz
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1%3Farch=el6