Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-cluster/ganglia@0.9.33
Typeebuild
Namespacesys-cluster
Nameganglia
Version0.9.33
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.32.2
Latest_non_vulnerable_version3.33
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4ug7-u7p1-53fw
vulnerability_id VCID-4ug7-u7p1-53fw
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2198.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2198
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74591
published_at 2026-04-01T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74595
published_at 2026-04-02T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.74622
published_at 2026-04-04T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.74596
published_at 2026-04-07T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74627
published_at 2026-04-08T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.74642
published_at 2026-04-09T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74665
published_at 2026-04-11T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.74645
published_at 2026-04-12T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.74637
published_at 2026-04-13T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74674
published_at 2026-04-21T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74682
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2198
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629688
reference_id 629688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629688
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=712148
reference_id 712148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=712148
5
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2011-2198
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ug7-u7p1-53fw
1
url VCID-6qug-har7-n7bj
vulnerability_id VCID-6qug-har7-n7bj
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1620
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26844
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26885
published_at 2026-04-02T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.2692
published_at 2026-04-04T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26706
published_at 2026-04-07T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26774
published_at 2026-04-08T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26823
published_at 2026-04-09T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26826
published_at 2026-04-11T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26781
published_at 2026-04-12T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26724
published_at 2026-04-13T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26733
published_at 2026-04-16T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26704
published_at 2026-04-18T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26669
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1620
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1620
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667796
reference_id 667796
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667796
3
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2012-1620
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qug-har7-n7bj
2
url VCID-7acu-gn7k-xudz
vulnerability_id VCID-7acu-gn7k-xudz
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3448
reference_id
reference_type
scores
0
value 0.13656
scoring_system epss
scoring_elements 0.94272
published_at 2026-04-21T12:55:00Z
1
value 0.13656
scoring_system epss
scoring_elements 0.94251
published_at 2026-04-12T12:55:00Z
2
value 0.13656
scoring_system epss
scoring_elements 0.94252
published_at 2026-04-13T12:55:00Z
3
value 0.13656
scoring_system epss
scoring_elements 0.94267
published_at 2026-04-16T12:55:00Z
4
value 0.13656
scoring_system epss
scoring_elements 0.94234
published_at 2026-04-07T12:55:00Z
5
value 0.13656
scoring_system epss
scoring_elements 0.94243
published_at 2026-04-08T12:55:00Z
6
value 0.13656
scoring_system epss
scoring_elements 0.94247
published_at 2026-04-09T12:55:00Z
7
value 0.19383
scoring_system epss
scoring_elements 0.95351
published_at 2026-04-02T12:55:00Z
8
value 0.19383
scoring_system epss
scoring_elements 0.95357
published_at 2026-04-04T12:55:00Z
9
value 0.19383
scoring_system epss
scoring_elements 0.95342
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3448
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3448
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683584
reference_id 683584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683584
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38030.php
reference_id CVE-2012-3448;OSVDB-84240
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38030.php
4
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2012-3448
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7acu-gn7k-xudz
3
url VCID-a5qw-zuvc-suhx
vulnerability_id VCID-a5qw-zuvc-suhx
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3314
reference_id
reference_type
scores
0
value 0.01585
scoring_system epss
scoring_elements 0.81638
published_at 2026-04-21T12:55:00Z
1
value 0.01585
scoring_system epss
scoring_elements 0.81532
published_at 2026-04-01T12:55:00Z
2
value 0.01585
scoring_system epss
scoring_elements 0.81543
published_at 2026-04-02T12:55:00Z
3
value 0.01585
scoring_system epss
scoring_elements 0.81565
published_at 2026-04-04T12:55:00Z
4
value 0.01585
scoring_system epss
scoring_elements 0.81563
published_at 2026-04-07T12:55:00Z
5
value 0.01585
scoring_system epss
scoring_elements 0.81591
published_at 2026-04-08T12:55:00Z
6
value 0.01585
scoring_system epss
scoring_elements 0.81596
published_at 2026-04-13T12:55:00Z
7
value 0.01585
scoring_system epss
scoring_elements 0.81617
published_at 2026-04-11T12:55:00Z
8
value 0.01585
scoring_system epss
scoring_elements 0.81604
published_at 2026-04-12T12:55:00Z
9
value 0.01585
scoring_system epss
scoring_elements 0.81634
published_at 2026-04-16T12:55:00Z
10
value 0.01585
scoring_system epss
scoring_elements 0.81635
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3314
1
reference_url http://www.debian.org/security/2010/dsa-2013
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2013
2
reference_url http://www.egroupware.org/news?item=93
reference_id
reference_type
scores
url http://www.egroupware.org/news?item=93
3
reference_url http://www.exploit-db.com/exploits/11777/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/11777/
4
reference_url http://www.openwall.com/lists/oss-security/2010/09/21/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/09/21/7
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3314
reference_id CVE-2010-3314
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-3314
14
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2010-3314
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a5qw-zuvc-suhx
4
url VCID-dmur-czwy-5uhr
vulnerability_id VCID-dmur-czwy-5uhr
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url http://pwhois.org/lft/
reference_id
reference_type
scores
url http://pwhois.org/lft/
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0765
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.2255
published_at 2026-04-21T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22532
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22705
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22749
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22614
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22668
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22685
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22644
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22589
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22604
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22601
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0765
2
reference_url http://www.kb.cert.org/vuls/id/946652
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/946652
3
reference_url http://www.securityfocus.com/bid/46477
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46477
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pwhois:layer_four_traceroute:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pwhois:layer_four_traceroute:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pwhois:layer_four_traceroute:3.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pwhois:layer_four_traceroute:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pwhois:layer_four_traceroute:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pwhois:layer_four_traceroute:3.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pwhois:layer_four_traceroute:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pwhois:layer_four_traceroute:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pwhois:layer_four_traceroute:3.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0765
reference_id CVE-2011-0765
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0765
8
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2011-0765
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmur-czwy-5uhr
5
url VCID-dn2z-a7hx-43gx
vulnerability_id VCID-dn2z-a7hx-43gx
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2738.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2738
reference_id
reference_type
scores
0
value 0.1804
scoring_system epss
scoring_elements 0.95133
published_at 2026-04-01T12:55:00Z
1
value 0.1804
scoring_system epss
scoring_elements 0.95144
published_at 2026-04-02T12:55:00Z
2
value 0.1804
scoring_system epss
scoring_elements 0.95145
published_at 2026-04-04T12:55:00Z
3
value 0.1804
scoring_system epss
scoring_elements 0.95148
published_at 2026-04-07T12:55:00Z
4
value 0.1804
scoring_system epss
scoring_elements 0.95155
published_at 2026-04-08T12:55:00Z
5
value 0.1804
scoring_system epss
scoring_elements 0.95159
published_at 2026-04-09T12:55:00Z
6
value 0.1804
scoring_system epss
scoring_elements 0.95165
published_at 2026-04-11T12:55:00Z
7
value 0.1804
scoring_system epss
scoring_elements 0.95166
published_at 2026-04-12T12:55:00Z
8
value 0.1804
scoring_system epss
scoring_elements 0.95169
published_at 2026-04-13T12:55:00Z
9
value 0.1804
scoring_system epss
scoring_elements 0.95177
published_at 2026-04-16T12:55:00Z
10
value 0.1804
scoring_system epss
scoring_elements 0.95181
published_at 2026-04-18T12:55:00Z
11
value 0.1804
scoring_system epss
scoring_elements 0.95182
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2738
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677717
reference_id 677717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677717
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=832356
reference_id 832356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=832356
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37477.txt
reference_id CVE-2012-2738;OSVDB-84337
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37477.txt
6
reference_url https://www.securityfocus.com/bid/54281/info
reference_id CVE-2012-2738;OSVDB-84337
reference_type exploit
scores
url https://www.securityfocus.com/bid/54281/info
7
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2012-2738
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn2z-a7hx-43gx
6
url VCID-fn24-qm2c-eqef
vulnerability_id VCID-fn24-qm2c-eqef
summary
EGroupware Code Injection vulnerability
`phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php` in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) aspell_path or (2) spellchecker_lang parameters.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3313
reference_id
reference_type
scores
0
value 0.023
scoring_system epss
scoring_elements 0.8476
published_at 2026-04-18T12:55:00Z
1
value 0.023
scoring_system epss
scoring_elements 0.84663
published_at 2026-04-01T12:55:00Z
2
value 0.023
scoring_system epss
scoring_elements 0.84678
published_at 2026-04-02T12:55:00Z
3
value 0.023
scoring_system epss
scoring_elements 0.84699
published_at 2026-04-04T12:55:00Z
4
value 0.023
scoring_system epss
scoring_elements 0.84701
published_at 2026-04-07T12:55:00Z
5
value 0.023
scoring_system epss
scoring_elements 0.84723
published_at 2026-04-08T12:55:00Z
6
value 0.023
scoring_system epss
scoring_elements 0.84729
published_at 2026-04-09T12:55:00Z
7
value 0.023
scoring_system epss
scoring_elements 0.84748
published_at 2026-04-11T12:55:00Z
8
value 0.023
scoring_system epss
scoring_elements 0.84743
published_at 2026-04-12T12:55:00Z
9
value 0.023
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-13T12:55:00Z
10
value 0.023
scoring_system epss
scoring_elements 0.84758
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3313
1
reference_url https://github.com/EGroupware/egroupware
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/EGroupware/egroupware
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3313
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-3313
3
reference_url http://www.debian.org/security/2010/dsa-2013
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2010/dsa-2013
4
reference_url http://www.egroupware.org/news?item=93
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.egroupware.org/news?item=93
5
reference_url http://www.exploit-db.com/exploits/11777
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.exploit-db.com/exploits/11777
6
reference_url http://www.exploit-db.com/exploits/11777/
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/11777/
7
reference_url http://www.openwall.com/lists/oss-security/2010/09/21/7
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2010/09/21/7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.001\+.002:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.001\+.002:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
reference_id cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/11777.txt
reference_id CVE-2010-3314;CVE-2010-3313;OSVDB-62805;OSVDB-62804
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/11777.txt
17
reference_url https://github.com/advisories/GHSA-5gx6-f2qq-475f
reference_id GHSA-5gx6-f2qq-475f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5gx6-f2qq-475f
18
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2010-3313, GHSA-5gx6-f2qq-475f
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fn24-qm2c-eqef
7
url VCID-g3kh-5185-3ybr
vulnerability_id VCID-g3kh-5185-3ybr
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0807
reference_id
reference_type
scores
0
value 0.04812
scoring_system epss
scoring_elements 0.89462
published_at 2026-04-01T12:55:00Z
1
value 0.04812
scoring_system epss
scoring_elements 0.89466
published_at 2026-04-02T12:55:00Z
2
value 0.04812
scoring_system epss
scoring_elements 0.89477
published_at 2026-04-04T12:55:00Z
3
value 0.04812
scoring_system epss
scoring_elements 0.89478
published_at 2026-04-07T12:55:00Z
4
value 0.04812
scoring_system epss
scoring_elements 0.89494
published_at 2026-04-08T12:55:00Z
5
value 0.04812
scoring_system epss
scoring_elements 0.89498
published_at 2026-04-09T12:55:00Z
6
value 0.04812
scoring_system epss
scoring_elements 0.89507
published_at 2026-04-11T12:55:00Z
7
value 0.04812
scoring_system epss
scoring_elements 0.89505
published_at 2026-04-12T12:55:00Z
8
value 0.04812
scoring_system epss
scoring_elements 0.895
published_at 2026-04-13T12:55:00Z
9
value 0.04812
scoring_system epss
scoring_elements 0.89514
published_at 2026-04-16T12:55:00Z
10
value 0.04812
scoring_system epss
scoring_elements 0.89515
published_at 2026-04-18T12:55:00Z
11
value 0.04812
scoring_system epss
scoring_elements 0.89512
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0807
1
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2012-0807
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g3kh-5185-3ybr
8
url VCID-g7gh-jk2n-b7cq
vulnerability_id VCID-g7gh-jk2n-b7cq
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html
1
reference_url http://lists.ziew.org/pipermail/libgadu-devel/2008-October/000331.html
reference_id
reference_type
scores
url http://lists.ziew.org/pipermail/libgadu-devel/2008-October/000331.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4776.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4776
reference_id
reference_type
scores
0
value 0.00593
scoring_system epss
scoring_elements 0.69284
published_at 2026-04-21T12:55:00Z
1
value 0.00593
scoring_system epss
scoring_elements 0.69191
published_at 2026-04-01T12:55:00Z
2
value 0.00593
scoring_system epss
scoring_elements 0.69207
published_at 2026-04-02T12:55:00Z
3
value 0.00593
scoring_system epss
scoring_elements 0.69228
published_at 2026-04-04T12:55:00Z
4
value 0.00593
scoring_system epss
scoring_elements 0.6921
published_at 2026-04-07T12:55:00Z
5
value 0.00593
scoring_system epss
scoring_elements 0.6926
published_at 2026-04-08T12:55:00Z
6
value 0.00593
scoring_system epss
scoring_elements 0.69278
published_at 2026-04-09T12:55:00Z
7
value 0.00593
scoring_system epss
scoring_elements 0.693
published_at 2026-04-11T12:55:00Z
8
value 0.00593
scoring_system epss
scoring_elements 0.69285
published_at 2026-04-12T12:55:00Z
9
value 0.00593
scoring_system epss
scoring_elements 0.69257
published_at 2026-04-13T12:55:00Z
10
value 0.00593
scoring_system epss
scoring_elements 0.69295
published_at 2026-04-16T12:55:00Z
11
value 0.00593
scoring_system epss
scoring_elements 0.69304
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4776
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46158
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46158
6
reference_url http://www.debian.org/security/2008/dsa-1664
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1664
7
reference_url http://www.securityfocus.com/bid/31951
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31951
8
reference_url http://www.ubuntu.com/usn/usn-692-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-692-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=468830
reference_id 468830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=468830
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503916
reference_id 503916
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503916
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wojtek_kaniewsk:libgadu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.7.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wojtek_kaniewsk:libgadu:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wojtek_kaniewsk:libgadu:1.8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4776
reference_id CVE-2008-4776
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4776
17
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
18
reference_url https://usn.ubuntu.com/692-1/
reference_id USN-692-1
reference_type
scores
url https://usn.ubuntu.com/692-1/
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2008-4776
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g7gh-jk2n-b7cq
9
url VCID-jz38-qp14-mqcd
vulnerability_id VCID-jz38-qp14-mqcd
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url http://git.gnome.org/browse/vte/commit/?id=8b971a7b2c59902914ecbbc3915c45dd21530a91
reference_id
reference_type
scores
url http://git.gnome.org/browse/vte/commit/?id=8b971a7b2c59902914ecbbc3915c45dd21530a91
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2713.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2713.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2713
reference_id
reference_type
scores
0
value 0.00873
scoring_system epss
scoring_elements 0.7528
published_at 2026-04-21T12:55:00Z
1
value 0.00873
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-01T12:55:00Z
2
value 0.00873
scoring_system epss
scoring_elements 0.75195
published_at 2026-04-02T12:55:00Z
3
value 0.00873
scoring_system epss
scoring_elements 0.75226
published_at 2026-04-04T12:55:00Z
4
value 0.00873
scoring_system epss
scoring_elements 0.75203
published_at 2026-04-07T12:55:00Z
5
value 0.00873
scoring_system epss
scoring_elements 0.75246
published_at 2026-04-08T12:55:00Z
6
value 0.00873
scoring_system epss
scoring_elements 0.75257
published_at 2026-04-09T12:55:00Z
7
value 0.00873
scoring_system epss
scoring_elements 0.75277
published_at 2026-04-11T12:55:00Z
8
value 0.00873
scoring_system epss
scoring_elements 0.75255
published_at 2026-04-12T12:55:00Z
9
value 0.00873
scoring_system epss
scoring_elements 0.75244
published_at 2026-04-13T12:55:00Z
10
value 0.00873
scoring_system epss
scoring_elements 0.75283
published_at 2026-04-16T12:55:00Z
11
value 0.00873
scoring_system epss
scoring_elements 0.75289
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2713
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2713
5
reference_url http://secunia.com/advisories/40635
reference_id
reference_type
scores
url http://secunia.com/advisories/40635
6
reference_url http://www.securityfocus.com/bid/41716
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/41716
7
reference_url http://www.ubuntu.com/usn/usn-962-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-962-1
8
reference_url http://www.vupen.com/english/advisories/2010/1839
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1839
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613110
reference_id 613110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613110
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-terminal:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-terminal:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-terminal:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.11.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.11.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.11.21:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.12.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.14.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.15.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.16.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.16.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.16.14:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.17.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.17.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.17.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.20.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.20.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.20.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.22.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.22.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.22.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.24.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nalin_dahyabhai:vte:0.24.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nalin_dahyabhai:vte:0.24.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2713
reference_id CVE-2010-2713
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2713
22
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
23
reference_url https://usn.ubuntu.com/962-1/
reference_id USN-962-1
reference_type
scores
url https://usn.ubuntu.com/962-1/
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2010-2713
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz38-qp14-mqcd
10
url VCID-ns47-4fvh-pqhu
vulnerability_id VCID-ns47-4fvh-pqhu
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0808
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10037
published_at 2026-04-01T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10159
published_at 2026-04-02T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10225
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10121
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10197
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10257
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10288
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10248
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10228
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10099
published_at 2026-04-16T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10077
published_at 2026-04-18T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.1021
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0808
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0808
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496
reference_id 655496
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496
3
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:ebuild/sys-cluster/ganglia@0.9.33
purl pkg:ebuild/sys-cluster/ganglia@0.9.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33
1
url pkg:ebuild/sys-cluster/ganglia@0.32.2
purl pkg:ebuild/sys-cluster/ganglia@0.32.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.32.2
2
url pkg:ebuild/sys-cluster/ganglia@1.0
purl pkg:ebuild/sys-cluster/ganglia@1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.0
3
url pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
purl pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@1.8.004.20120613
4
url pkg:ebuild/sys-cluster/ganglia@3.3.7
purl pkg:ebuild/sys-cluster/ganglia@3.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.3.7
5
url pkg:ebuild/sys-cluster/ganglia@3.33
purl pkg:ebuild/sys-cluster/ganglia@3.33
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@3.33
aliases CVE-2012-0808
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ns47-4fvh-pqhu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ganglia@0.9.33