Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ganglia@3.6.0-1?distro=sid
Typedeb
Namespacedebian
Nameganglia
Version3.6.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.7.2-4
Latest_non_vulnerable_version3.7.2-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6cvd-mxks-jfct
vulnerability_id VCID-6cvd-mxks-jfct
summary Cross-site scripting (XSS) vulnerability in header.php in Ganglia Web 3.5.8 and 3.5.10 allows remote attackers to inject arbitrary web script or HTML via the host_regex parameter to the default URI, which is processed by get_context.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6395
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65898
published_at 2026-04-21T12:55:00Z
1
value 0.00573
scoring_system epss
scoring_elements 0.68646
published_at 2026-04-02T12:55:00Z
2
value 0.00573
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-04T12:55:00Z
3
value 0.00573
scoring_system epss
scoring_elements 0.68642
published_at 2026-04-07T12:55:00Z
4
value 0.00573
scoring_system epss
scoring_elements 0.68693
published_at 2026-04-08T12:55:00Z
5
value 0.00573
scoring_system epss
scoring_elements 0.68628
published_at 2026-04-01T12:55:00Z
6
value 0.00573
scoring_system epss
scoring_elements 0.68734
published_at 2026-04-16T12:55:00Z
7
value 0.00573
scoring_system epss
scoring_elements 0.6872
published_at 2026-04-12T12:55:00Z
8
value 0.00573
scoring_system epss
scoring_elements 0.68691
published_at 2026-04-13T12:55:00Z
9
value 0.00573
scoring_system epss
scoring_elements 0.68744
published_at 2026-04-18T12:55:00Z
10
value 0.00573
scoring_system epss
scoring_elements 0.68711
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6395
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6395
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507
reference_id 730507
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2013-6395
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cvd-mxks-jfct
1
url VCID-hudz-fdgm-ducn
vulnerability_id VCID-hudz-fdgm-ducn
summary ganglia-web before 3.7.1 allows remote attackers to bypass authentication.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6816
reference_id
reference_type
scores
0
value 0.0211
scoring_system epss
scoring_elements 0.84038
published_at 2026-04-01T12:55:00Z
1
value 0.0211
scoring_system epss
scoring_elements 0.84051
published_at 2026-04-02T12:55:00Z
2
value 0.0211
scoring_system epss
scoring_elements 0.84068
published_at 2026-04-04T12:55:00Z
3
value 0.0211
scoring_system epss
scoring_elements 0.84069
published_at 2026-04-07T12:55:00Z
4
value 0.0211
scoring_system epss
scoring_elements 0.84093
published_at 2026-04-08T12:55:00Z
5
value 0.0211
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-09T12:55:00Z
6
value 0.0211
scoring_system epss
scoring_elements 0.84116
published_at 2026-04-11T12:55:00Z
7
value 0.0211
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-12T12:55:00Z
8
value 0.0211
scoring_system epss
scoring_elements 0.84106
published_at 2026-04-13T12:55:00Z
9
value 0.0211
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-16T12:55:00Z
10
value 0.0211
scoring_system epss
scoring_elements 0.8413
published_at 2026-04-18T12:55:00Z
11
value 0.0211
scoring_system epss
scoring_elements 0.84133
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6816
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6816
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798213
reference_id 798213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798213
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2015-6816
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudz-fdgm-ducn
2
url VCID-ku3u-hzyv-ukee
vulnerability_id VCID-ku3u-hzyv-ukee
summary Cross-site scripting (XSS) vulnerability in views_view.php in Ganglia Web 3.5.7 allows remote attackers to inject arbitrary web script or HTML via the view_name parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1770
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61014
published_at 2026-04-01T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.61091
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61119
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61085
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61134
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61149
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.6117
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61156
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61137
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61178
published_at 2026-04-16T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61184
published_at 2026-04-18T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1770
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1770
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1770
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
reference_id 700158
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
reference_id 700159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2013-1770
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku3u-hzyv-ukee
3
url VCID-nmjy-zdsd-eybg
vulnerability_id VCID-nmjy-zdsd-eybg
summary Multiple cross-site scripting (XSS) vulnerabilities in Ganglia Web before 3.5.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url http://ganglia.info/?p=566
reference_id
reference_type
scores
url http://ganglia.info/?p=566
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0275
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52824
published_at 2026-04-21T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52699
published_at 2026-04-01T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5274
published_at 2026-04-02T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52767
published_at 2026-04-04T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52733
published_at 2026-04-07T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52784
published_at 2026-04-08T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52778
published_at 2026-04-09T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52829
published_at 2026-04-11T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52813
published_at 2026-04-12T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52796
published_at 2026-04-13T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52833
published_at 2026-04-16T12:55:00Z
11
value 0.00295
scoring_system epss
scoring_elements 0.5284
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0275
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=892823
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=892823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0275
4
reference_url https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
reference_id
reference_type
scores
url https://github.com/ganglia/ganglia-web/commit/31d348947419058c43b8dfcd062e2988abd5058e
5
reference_url http://www.openwall.com/lists/oss-security/2013/02/08/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/08/6
6
reference_url http://www.securityfocus.com/bid/58204
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58204
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
reference_id 700158
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700158
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
reference_id 700159
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700159
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ganglia:ganglia-web:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ganglia:ganglia-web:3.5.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0275
reference_id CVE-2013-0275
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0275
fixed_packages
0
url pkg:deb/debian/ganglia@3.6.0-1?distro=sid
purl pkg:deb/debian/ganglia@3.6.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid
1
url pkg:deb/debian/ganglia@3.7.2-4?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-4%3Fdistro=sid
2
url pkg:deb/debian/ganglia@3.7.2-6?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-6?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-6%3Fdistro=sid
3
url pkg:deb/debian/ganglia@3.7.2-7?distro=sid
purl pkg:deb/debian/ganglia@3.7.2-7?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.7.2-7%3Fdistro=sid
aliases CVE-2013-0275
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmjy-zdsd-eybg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ganglia@3.6.0-1%3Fdistro=sid