Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/glance@2014.1-1?distro=trixie
Typedeb
Namespacedebian
Nameglance
Version2014.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2014.1.3-1
Latest_non_vulnerable_version2:32.0.0-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-uveb-gt8h-1kcr
vulnerability_id VCID-uveb-gt8h-1kcr
summary
OpenStack Image Registry and Delivery Service (Glance) Improper Input Validation vulnerability
The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-0455.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0455.html
1
reference_url https://access.redhat.com/errata/RHSA-2014:0455
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2014:0455
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0162.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0162.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-0162
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-0162
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0162
reference_id
reference_type
scores
0
value 0.00557
scoring_system epss
scoring_elements 0.68266
published_at 2026-04-29T12:55:00Z
1
value 0.00557
scoring_system epss
scoring_elements 0.68216
published_at 2026-04-12T12:55:00Z
2
value 0.00557
scoring_system epss
scoring_elements 0.68182
published_at 2026-04-13T12:55:00Z
3
value 0.00557
scoring_system epss
scoring_elements 0.6822
published_at 2026-04-16T12:55:00Z
4
value 0.00557
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-18T12:55:00Z
5
value 0.00557
scoring_system epss
scoring_elements 0.68211
published_at 2026-04-21T12:55:00Z
6
value 0.00557
scoring_system epss
scoring_elements 0.68254
published_at 2026-04-24T12:55:00Z
7
value 0.00557
scoring_system epss
scoring_elements 0.68262
published_at 2026-04-26T12:55:00Z
8
value 0.00557
scoring_system epss
scoring_elements 0.6812
published_at 2026-04-01T12:55:00Z
9
value 0.00557
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-02T12:55:00Z
10
value 0.00557
scoring_system epss
scoring_elements 0.6816
published_at 2026-04-04T12:55:00Z
11
value 0.00557
scoring_system epss
scoring_elements 0.68138
published_at 2026-04-07T12:55:00Z
12
value 0.00557
scoring_system epss
scoring_elements 0.68189
published_at 2026-04-08T12:55:00Z
13
value 0.00557
scoring_system epss
scoring_elements 0.68204
published_at 2026-04-09T12:55:00Z
14
value 0.00557
scoring_system epss
scoring_elements 0.68229
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0162
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1085163
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1085163
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0162
7
reference_url https://launchpad.net/bugs/1298698
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://launchpad.net/bugs/1298698
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0162
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-0162
9
reference_url https://opendev.org/openstack/glance
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/glance
10
reference_url http://www.openwall.com/lists/oss-security/2014/04/10/13
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/04/10/13
11
reference_url http://www.ubuntu.com/usn/USN-2193-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2193-1
12
reference_url https://github.com/advisories/GHSA-r7pj-rvwg-vxhr
reference_id GHSA-r7pj-rvwg-vxhr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r7pj-rvwg-vxhr
13
reference_url https://usn.ubuntu.com/2193-1/
reference_id USN-2193-1
reference_type
scores
url https://usn.ubuntu.com/2193-1/
fixed_packages
0
url pkg:deb/debian/glance@2014.1-1?distro=trixie
purl pkg:deb/debian/glance@2014.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1-1%3Fdistro=trixie
1
url pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:21.0.0-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:25.1.0-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
purl pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:30.0.0-3%3Fdistro=trixie
4
url pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-1%3Fdistro=trixie
5
url pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-2%3Fdistro=trixie
aliases CVE-2014-0162, GHSA-r7pj-rvwg-vxhr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uveb-gt8h-1kcr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1-1%3Fdistro=trixie