Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7jb6-q4x1-cfbw
Summaryxml_parse() DTD validation can be used to read arbitrary filesmore details
Aliases
0
alias CVE-2012-3489
Fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
1
url pkg:generic/postgresql@8.3.20
purl pkg:generic/postgresql@8.3.20
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.20
2
url pkg:generic/postgresql@8.4.13
purl pkg:generic/postgresql@8.4.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.13
3
url pkg:generic/postgresql@9.0.9
purl pkg:generic/postgresql@9.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.9
4
url pkg:generic/postgresql@9.1.5
purl pkg:generic/postgresql@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.5
Affected_packages
0
url pkg:generic/postgresql@8.3.0
purl pkg:generic/postgresql@8.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qsp-wvwq-j3f5
1
vulnerability VCID-1uzm-h9m3-akge
2
vulnerability VCID-2nve-471m-17h6
3
vulnerability VCID-35a3-5eq3-8bep
4
vulnerability VCID-666x-ret3-xufr
5
vulnerability VCID-6dmy-t1qp-nuf3
6
vulnerability VCID-6mck-xykx-yuba
7
vulnerability VCID-721k-9zdg-buhv
8
vulnerability VCID-7jb6-q4x1-cfbw
9
vulnerability VCID-7q99-jk4u-1fen
10
vulnerability VCID-811b-x31n-tfch
11
vulnerability VCID-bdq4-br3j-7kb8
12
vulnerability VCID-c8ch-zd9x-kufn
13
vulnerability VCID-cffd-gdpc-uqeb
14
vulnerability VCID-quqr-bg9k-7yb5
15
vulnerability VCID-s8a2-wbb4-dyda
16
vulnerability VCID-u5h4-4p6j-wbay
17
vulnerability VCID-v69z-cmag-xfaf
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.0
1
url pkg:generic/postgresql@8.4.0
purl pkg:generic/postgresql@8.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1uzm-h9m3-akge
1
vulnerability VCID-2nve-471m-17h6
2
vulnerability VCID-35a3-5eq3-8bep
3
vulnerability VCID-666x-ret3-xufr
4
vulnerability VCID-6mck-xykx-yuba
5
vulnerability VCID-721k-9zdg-buhv
6
vulnerability VCID-7jb6-q4x1-cfbw
7
vulnerability VCID-7q99-jk4u-1fen
8
vulnerability VCID-811b-x31n-tfch
9
vulnerability VCID-8cbh-gwwy-n3eq
10
vulnerability VCID-8j4f-u2tq-1qev
11
vulnerability VCID-bdq4-br3j-7kb8
12
vulnerability VCID-c8ch-zd9x-kufn
13
vulnerability VCID-cffd-gdpc-uqeb
14
vulnerability VCID-g4tm-8zhw-a7hn
15
vulnerability VCID-kbgc-w2jw-auh8
16
vulnerability VCID-nz16-gzhk-h3c1
17
vulnerability VCID-pvxg-byvu-pbec
18
vulnerability VCID-quqr-bg9k-7yb5
19
vulnerability VCID-reab-s9cu-yudn
20
vulnerability VCID-s8a2-wbb4-dyda
21
vulnerability VCID-u5h4-4p6j-wbay
22
vulnerability VCID-ux6m-dn6j-37dc
23
vulnerability VCID-v69z-cmag-xfaf
24
vulnerability VCID-w518-wkek-97ag
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.0
2
url pkg:generic/postgresql@9.0.0
purl pkg:generic/postgresql@9.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qap-rdxz-4uer
1
vulnerability VCID-2nve-471m-17h6
2
vulnerability VCID-35a3-5eq3-8bep
3
vulnerability VCID-625c-amyd-dybm
4
vulnerability VCID-666x-ret3-xufr
5
vulnerability VCID-6mck-xykx-yuba
6
vulnerability VCID-7jb6-q4x1-cfbw
7
vulnerability VCID-7q99-jk4u-1fen
8
vulnerability VCID-811b-x31n-tfch
9
vulnerability VCID-8cbh-gwwy-n3eq
10
vulnerability VCID-8j4f-u2tq-1qev
11
vulnerability VCID-a3sh-4t1e-tbh4
12
vulnerability VCID-bdq4-br3j-7kb8
13
vulnerability VCID-bqag-mh3g-fqe7
14
vulnerability VCID-f976-dd3s-fuc8
15
vulnerability VCID-fd5z-bj21-m3a5
16
vulnerability VCID-g4tm-8zhw-a7hn
17
vulnerability VCID-k38h-5crc-u3hr
18
vulnerability VCID-kbgc-w2jw-auh8
19
vulnerability VCID-mebz-9qb7-5bd2
20
vulnerability VCID-n3ka-63rx-5fgk
21
vulnerability VCID-nz16-gzhk-h3c1
22
vulnerability VCID-pvxg-byvu-pbec
23
vulnerability VCID-quqr-bg9k-7yb5
24
vulnerability VCID-raqj-ezua-skeb
25
vulnerability VCID-reab-s9cu-yudn
26
vulnerability VCID-ux6m-dn6j-37dc
27
vulnerability VCID-w518-wkek-97ag
28
vulnerability VCID-zbj3-7xug-43f6
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.0
3
url pkg:generic/postgresql@9.1.0
purl pkg:generic/postgresql@9.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qap-rdxz-4uer
1
vulnerability VCID-2nve-471m-17h6
2
vulnerability VCID-35a3-5eq3-8bep
3
vulnerability VCID-625c-amyd-dybm
4
vulnerability VCID-6mck-xykx-yuba
5
vulnerability VCID-7jb6-q4x1-cfbw
6
vulnerability VCID-811b-x31n-tfch
7
vulnerability VCID-8bu8-zpfv-8bgg
8
vulnerability VCID-8cbh-gwwy-n3eq
9
vulnerability VCID-8j4f-u2tq-1qev
10
vulnerability VCID-9b6v-1bt1-dfgy
11
vulnerability VCID-a3sh-4t1e-tbh4
12
vulnerability VCID-bdq4-br3j-7kb8
13
vulnerability VCID-bqag-mh3g-fqe7
14
vulnerability VCID-f976-dd3s-fuc8
15
vulnerability VCID-fd5z-bj21-m3a5
16
vulnerability VCID-g4tm-8zhw-a7hn
17
vulnerability VCID-k38h-5crc-u3hr
18
vulnerability VCID-kbgc-w2jw-auh8
19
vulnerability VCID-mebz-9qb7-5bd2
20
vulnerability VCID-n3ka-63rx-5fgk
21
vulnerability VCID-nz16-gzhk-h3c1
22
vulnerability VCID-pvxg-byvu-pbec
23
vulnerability VCID-quqr-bg9k-7yb5
24
vulnerability VCID-raqj-ezua-skeb
25
vulnerability VCID-reab-s9cu-yudn
26
vulnerability VCID-skb5-eeak-v7hz
27
vulnerability VCID-t864-ytjh-nyg1
28
vulnerability VCID-ux6m-dn6j-37dc
29
vulnerability VCID-w518-wkek-97ag
30
vulnerability VCID-z4t8-c8vc-ayhd
31
vulnerability VCID-zbj3-7xug-43f6
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.0
4
url pkg:rpm/redhat/postgresql@8.4.13-1?arch=el6_3
purl pkg:rpm/redhat/postgresql@8.4.13-1?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jb6-q4x1-cfbw
1
vulnerability VCID-bdq4-br3j-7kb8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql@8.4.13-1%3Farch=el6_3
5
url pkg:rpm/redhat/postgresql84@8.4.13-1?arch=el5_8
purl pkg:rpm/redhat/postgresql84@8.4.13-1?arch=el5_8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jb6-q4x1-cfbw
1
vulnerability VCID-bdq4-br3j-7kb8
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql84@8.4.13-1%3Farch=el5_8
References
0
reference_url http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1263.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1263.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3489.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3489.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3489
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.76462
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76477
published_at 2026-04-18T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-01T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.76376
published_at 2026-04-02T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76406
published_at 2026-04-04T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76388
published_at 2026-04-07T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.7642
published_at 2026-04-08T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76434
published_at 2026-04-09T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76459
published_at 2026-04-11T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76437
published_at 2026-04-12T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-13T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76472
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3489
7
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
8
reference_url http://secunia.com/advisories/50635
reference_id
reference_type
scores
url http://secunia.com/advisories/50635
9
reference_url http://secunia.com/advisories/50718
reference_id
reference_type
scores
url http://secunia.com/advisories/50718
10
reference_url http://secunia.com/advisories/50859
reference_id
reference_type
scores
url http://secunia.com/advisories/50859
11
reference_url http://secunia.com/advisories/50946
reference_id
reference_type
scores
url http://secunia.com/advisories/50946
12
reference_url https://www.postgresql.org/support/security/CVE-2012-3489/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-3489/
13
reference_url http://www.debian.org/security/2012/dsa-2534
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2534
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
15
reference_url http://www.postgresql.org/about/news/1407/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1407/
16
reference_url http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
17
reference_url http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
18
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
19
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
20
reference_url http://www.postgresql.org/support/security/
reference_id
reference_type
scores
url http://www.postgresql.org/support/security/
21
reference_url http://www.securityfocus.com/bid/55074
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55074
22
reference_url http://www.ubuntu.com/usn/USN-1542-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1542-1
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=849173
reference_id 849173
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=849173
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3489
reference_id CVE-2012-3489
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3489
44
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
45
reference_url https://access.redhat.com/errata/RHSA-2012:1263
reference_id RHSA-2012:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1263
46
reference_url https://usn.ubuntu.com/1542-1/
reference_id USN-1542-1
reference_type
scores
url https://usn.ubuntu.com/1542-1/
Weaknesses
0
cwe_id 611
name Improper Restriction of XML External Entity Reference
description The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Exploits
Severity_range_score4.0 - 6.5
Exploitability0.5
Weighted_severity5.9
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7jb6-q4x1-cfbw