Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-s4mk-tab8-sfg5
Summary
A vulnerability in spice-gtk could allow local attackers to gain
    escalated privileges.
Aliases
0
alias CVE-2012-4425
Fixed_packages
0
url pkg:deb/debian/spice-gtk@0.12-5?distro=trixie
purl pkg:deb/debian/spice-gtk@0.12-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.12-5%3Fdistro=trixie
1
url pkg:deb/debian/spice-gtk@0.39-1?distro=trixie
purl pkg:deb/debian/spice-gtk@0.39-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.39-1%3Fdistro=trixie
2
url pkg:deb/debian/spice-gtk@0.42-1?distro=trixie
purl pkg:deb/debian/spice-gtk@0.42-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.42-1%3Fdistro=trixie
3
url pkg:deb/debian/spice-gtk@0.42-3?distro=trixie
purl pkg:deb/debian/spice-gtk@0.42-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.42-3%3Fdistro=trixie
4
url pkg:deb/debian/spice-gtk@0.42-4?distro=trixie
purl pkg:deb/debian/spice-gtk@0.42-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.42-4%3Fdistro=trixie
5
url pkg:ebuild/net-misc/spice-gtk@0.14
purl pkg:ebuild/net-misc/spice-gtk@0.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/spice-gtk@0.14
Affected_packages
0
url pkg:rpm/redhat/spice-gtk@0.11-11.el6_3?arch=1
purl pkg:rpm/redhat/spice-gtk@0.11-11.el6_3?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-s4mk-tab8-sfg5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-gtk@0.11-11.el6_3%3Farch=1
References
0
reference_url http://permalink.gmane.org/gmane.linux.redhat.fedora.extras.cvs/853051
reference_id
reference_type
scores
url http://permalink.gmane.org/gmane.linux.redhat.fedora.extras.cvs/853051
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1284.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1284.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4425.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4425.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4425
reference_id
reference_type
scores
0
value 0.00517
scoring_system epss
scoring_elements 0.66731
published_at 2026-04-21T12:55:00Z
1
value 0.00517
scoring_system epss
scoring_elements 0.66619
published_at 2026-04-01T12:55:00Z
2
value 0.00517
scoring_system epss
scoring_elements 0.66659
published_at 2026-04-02T12:55:00Z
3
value 0.00517
scoring_system epss
scoring_elements 0.66685
published_at 2026-04-04T12:55:00Z
4
value 0.00517
scoring_system epss
scoring_elements 0.66658
published_at 2026-04-07T12:55:00Z
5
value 0.00517
scoring_system epss
scoring_elements 0.66707
published_at 2026-04-08T12:55:00Z
6
value 0.00517
scoring_system epss
scoring_elements 0.66722
published_at 2026-04-09T12:55:00Z
7
value 0.00517
scoring_system epss
scoring_elements 0.66742
published_at 2026-04-11T12:55:00Z
8
value 0.00517
scoring_system epss
scoring_elements 0.66728
published_at 2026-04-12T12:55:00Z
9
value 0.00517
scoring_system epss
scoring_elements 0.66699
published_at 2026-04-13T12:55:00Z
10
value 0.00517
scoring_system epss
scoring_elements 0.66732
published_at 2026-04-16T12:55:00Z
11
value 0.00517
scoring_system epss
scoring_elements 0.66746
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4425
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4425
5
reference_url http://www.exploit-db.com/exploits/21323
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/21323
6
reference_url http://www.openwall.com/lists/oss-security/2012/09/12/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/12/6
7
reference_url http://www.openwall.com/lists/oss-security/2012/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/14/2
8
reference_url http://www.openwall.com/lists/oss-security/2012/09/17/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/17/2
9
reference_url http://www.securityfocus.com/bid/55555
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55555
10
reference_url http://www.spinics.net/lists/spice-devel/msg01940.html
reference_id
reference_type
scores
url http://www.spinics.net/lists/spice-devel/msg01940.html
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689155
reference_id 689155
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689155
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=857283
reference_id 857283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=857283
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:spice-gtk:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:spice-gtk:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:spice-gtk:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:libgio:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gtk:libgio:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:libgio:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4425
reference_id CVE-2012-4425
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4425
16
reference_url https://security.gentoo.org/glsa/201406-29
reference_id GLSA-201406-29
reference_type
scores
url https://security.gentoo.org/glsa/201406-29
17
reference_url https://access.redhat.com/errata/RHSA-2012:1284
reference_id RHSA-2012:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1284
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
0
date_added 2012-09-14
description libdbus - 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation
required_action null
due_date null
notes null
known_ransomware_campaign_use false
source_date_published 2012-07-17
exploit_type local
platform linux
source_date_updated 2012-09-14
data_source Exploit-DB
source_url
Severity_range_score6.9 - 6.9
Exploitability2.0
Weighted_severity6.2
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-s4mk-tab8-sfg5