Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ganglia@3.7.2-7?distro=sid
Typedeb
Namespacedebian
Nameganglia
Version3.7.2-7
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6cvd-mxks-jfct
vulnerability_id VCID-6cvd-mxks-jfct
summary Cross-site scripting (XSS) vulnerability in header.php in Ganglia Web 3.5.8 and 3.5.10 allows remote attackers to inject arbitrary web script or HTML via the host_regex parameter to the default URI, which is processed by get_context.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6395
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65898
published_at 2026-04-21T12:55:00Z
1
value 0.00573
scoring_system epss
scoring_elements 0.68646
published_at 2026-04-02T12:55:00Z
2
value 0.00573
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-04T12:55:00Z
3
value 0.00573
scoring_system epss
scoring_elements 0.68642
published_at 2026-04-07T12:55:00Z
4
value 0.00573
scoring_system epss
scoring_elements 0.68693
published_at 2026-04-08T12:55:00Z
5
value 0.00573
scoring_system epss
scoring_elements 0.68628
published_at 2026-04-01T12:55:00Z
6
value 0.00573
scoring_system epss
scoring_elements 0.68734
published_at 2026-04-16T12:55:00Z
7
value 0.00573
scoring_system epss
scoring_elements 0.6872
published_at 2026-04-12T12:55:00Z
8
value 0.00573
scoring_system epss
scoring_elements 0.68691
published_at 2026-04-13T12:55:00Z
9
value 0.00573
scoring_system epss
scoring_elements 0.68744
published_at 2026-04-18T12:55:00Z
10
value 0.00573
scoring_system epss
scoring_elements 0.68711
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6395
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6395
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507
reference_id 730507
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2013-6395
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cvd-mxks-jfct
1
url VCID-7acu-gn7k-xudz
vulnerability_id VCID-7acu-gn7k-xudz
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2013. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3448
reference_id
reference_type
scores
0
value 0.13656
scoring_system epss
scoring_elements 0.94272
published_at 2026-04-21T12:55:00Z
1
value 0.13656
scoring_system epss
scoring_elements 0.94251
published_at 2026-04-12T12:55:00Z
2
value 0.13656
scoring_system epss
scoring_elements 0.94252
published_at 2026-04-13T12:55:00Z
3
value 0.13656
scoring_system epss
scoring_elements 0.94267
published_at 2026-04-16T12:55:00Z
4
value 0.13656
scoring_system epss
scoring_elements 0.94234
published_at 2026-04-07T12:55:00Z
5
value 0.13656
scoring_system epss
scoring_elements 0.94243
published_at 2026-04-08T12:55:00Z
6
value 0.13656
scoring_system epss
scoring_elements 0.94247
published_at 2026-04-09T12:55:00Z
7
value 0.19383
scoring_system epss
scoring_elements 0.95351
published_at 2026-04-02T12:55:00Z
8
value 0.19383
scoring_system epss
scoring_elements 0.95357
published_at 2026-04-04T12:55:00Z
9
value 0.19383
scoring_system epss
scoring_elements 0.95342
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3448
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3448
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683584
reference_id 683584
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683584
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38030.php
reference_id CVE-2012-3448;OSVDB-84240
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38030.php
4
reference_url https://security.gentoo.org/glsa/201412-10
reference_id GLSA-201412-10
reference_type
scores
url https://security.gentoo.org/glsa/201412-10
fixed_packages
0
url pkg:deb/debian/ganglia@3.3.8-1?distro=sid
purl pkg:deb/debian/ganglia@3.3.8-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.3.8-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2012-3448
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7acu-gn7k-xudz
2
url VCID-hudz-fdgm-ducn
vulnerability_id VCID-hudz-fdgm-ducn
summary ganglia-web before 3.7.1 allows remote attackers to bypass authentication.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6816
reference_id
reference_type
scores
0
value 0.0211
scoring_system epss
scoring_elements 0.84038
published_at 2026-04-01T12:55:00Z
1
value 0.0211
scoring_system epss
scoring_elements 0.84051
published_at 2026-04-02T12:55:00Z
2
value 0.0211
scoring_system epss
scoring_elements 0.84068
published_at 2026-04-04T12:55:00Z
3
value 0.0211
scoring_system epss
scoring_elements 0.84069
published_at 2026-04-07T12:55:00Z
4
value 0.0211
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-08T12:55:00Z
5
value 0.0211
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-09T12:55:00Z
6
value 0.0211
scoring_system epss
scoring_elements 0.84116
published_at 2026-04-11T12:55:00Z
7
value 0.0211
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-12T12:55:00Z
8
value 0.0211
scoring_system epss
scoring_elements 0.84106
published_at 2026-04-13T12:55:00Z
9
value 0.0211
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-16T12:55:00Z
10
value 0.0211
scoring_system epss
scoring_elements 0.8413
published_at 2026-04-18T12:55:00Z
11
value 0.0211
scoring_system epss
scoring_elements 0.84133
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6816
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6816
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798213
reference_id 798213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798213
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2015-6816
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudz-fdgm-ducn
3
url VCID-ku3u-hzyv-ukee
vulnerability_id VCID-ku3u-hzyv-ukee
summary Cross-site scripting (XSS) vulnerability in views_view.php in Ganglia Web 3.5.7 allows remote attackers to inject arbitrary web script or HTML via the view_name parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1770
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61014
published_at 2026-04-01T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.61091
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61119
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61085
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61134
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61149
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.6117
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61156
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61137
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61178
published_at 2026-04-16T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61184
published_at 2026-04-18T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1770
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1770
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
reference_id 700158
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
reference_id 700159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2013-1770
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku3u-hzyv-ukee
4
url VCID-nmjy-zdsd-eybg
vulnerability_id VCID-nmjy-zdsd-eybg
summary Multiple cross-site scripting (XSS) vulnerabilities in Ganglia Web before 3.5.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url http://ganglia.info/?p=566
reference_id
reference_type
scores
url http://ganglia.info/?p=566
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0275
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52824
published_at 2026-04-21T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52699
published_at 2026-04-01T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5274
published_at 2026-04-02T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52767
published_at 2026-04-04T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52733
published_at 2026-04-07T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52784
published_at 2026-04-08T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52778
published_at 2026-04-09T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52829
published_at 2026-04-11T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52813
published_at 2026-04-12T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52796
published_at 2026-04-13T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52833
published_at 2026-04-16T12:55:00Z
11
value 0.00295
scoring_system epss
scoring_elements 0.5284
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0275
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=892823
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=892823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0275
4
reference_url https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
reference_id
reference_type
scores
url https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
5
reference_url http://www.openwall.com/lists/oss-security/2013/02/08/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/08/6
6
reference_url http://www.securityfocus.com/bid/58204
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58204
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
reference_id 700158
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
reference_id 700159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0275
reference_id CVE-2013-0275
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0275
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2013-0275
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmjy-zdsd-eybg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid