Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-c3cm-h13f-jubq
SummaryCandlepin before 0.7.24, as used in Red Hat Subscription Asset Manager before 1.2.1, does not properly check manifest signatures, which allows local users to modify manifests.
Aliases
0
alias CVE-2012-6119
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/candlepin@0.7.24-1?arch=el6_3
purl pkg:rpm/redhat/candlepin@0.7.24-1?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/candlepin@0.7.24-1%3Farch=el6_3
1
url pkg:rpm/redhat/katello@1.2.1.1-1h?arch=el6_4
purl pkg:rpm/redhat/katello@1.2.1.1-1h?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/katello@1.2.1.1-1h%3Farch=el6_4
2
url pkg:rpm/redhat/katello-configure@1.2.3.1-4h?arch=el6_4
purl pkg:rpm/redhat/katello-configure@1.2.3.1-4h?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/katello-configure@1.2.3.1-4h%3Farch=el6_4
3
url pkg:rpm/redhat/rubygem-actionpack@1:3.0.10-12?arch=el6cf
purl pkg:rpm/redhat/rubygem-actionpack@1:3.0.10-12?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-actionpack@1:3.0.10-12%3Farch=el6cf
4
url pkg:rpm/redhat/rubygem-activemodel@3.0.10-3?arch=el6cf
purl pkg:rpm/redhat/rubygem-activemodel@3.0.10-3?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-activemodel@3.0.10-3%3Farch=el6cf
5
url pkg:rpm/redhat/rubygem-delayed_job@2.1.4-3?arch=el6cf
purl pkg:rpm/redhat/rubygem-delayed_job@2.1.4-3?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-91xe-ev7t-akb9
2
vulnerability VCID-9qc2-be2u-vfgv
3
vulnerability VCID-9uh8-upzm-7bgd
4
vulnerability VCID-c3cm-h13f-jubq
5
vulnerability VCID-ebq1-gkhe-pua7
6
vulnerability VCID-hbtn-7423-m3gb
7
vulnerability VCID-pb4n-q6u8-syds
8
vulnerability VCID-teq8-nqhf-xbbq
9
vulnerability VCID-vspr-h3ds-dudq
10
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-delayed_job@2.1.4-3%3Farch=el6cf
6
url pkg:rpm/redhat/rubygem-json@1.7.3-2?arch=el6_3
purl pkg:rpm/redhat/rubygem-json@1.7.3-2?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-json@1.7.3-2%3Farch=el6_3
7
url pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4?arch=el6cf
purl pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-91xe-ev7t-akb9
2
vulnerability VCID-9qc2-be2u-vfgv
3
vulnerability VCID-9uh8-upzm-7bgd
4
vulnerability VCID-c3cm-h13f-jubq
5
vulnerability VCID-ebq1-gkhe-pua7
6
vulnerability VCID-hbtn-7423-m3gb
7
vulnerability VCID-pb4n-q6u8-syds
8
vulnerability VCID-t9j5-gkyc-gbhw
9
vulnerability VCID-teq8-nqhf-xbbq
10
vulnerability VCID-vspr-h3ds-dudq
11
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4%3Farch=el6cf
8
url pkg:rpm/redhat/rubygem-rack@1:1.3.0-4?arch=el6cf
purl pkg:rpm/redhat/rubygem-rack@1:1.3.0-4?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-rack@1:1.3.0-4%3Farch=el6cf
9
url pkg:rpm/redhat/rubygem-rails_warden@0.5.5-2?arch=el6cf
purl pkg:rpm/redhat/rubygem-rails_warden@0.5.5-2?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-91xe-ev7t-akb9
2
vulnerability VCID-9qc2-be2u-vfgv
3
vulnerability VCID-9uh8-upzm-7bgd
4
vulnerability VCID-c3cm-h13f-jubq
5
vulnerability VCID-ebq1-gkhe-pua7
6
vulnerability VCID-hbtn-7423-m3gb
7
vulnerability VCID-pb4n-q6u8-syds
8
vulnerability VCID-teq8-nqhf-xbbq
9
vulnerability VCID-vspr-h3ds-dudq
10
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-rails_warden@0.5.5-2%3Farch=el6cf
10
url pkg:rpm/redhat/rubygem-rdoc@3.8-6?arch=el6cf
purl pkg:rpm/redhat/rubygem-rdoc@3.8-6?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-91xe-ev7t-akb9
2
vulnerability VCID-9qc2-be2u-vfgv
3
vulnerability VCID-9uh8-upzm-7bgd
4
vulnerability VCID-c3cm-h13f-jubq
5
vulnerability VCID-ebq1-gkhe-pua7
6
vulnerability VCID-hbtn-7423-m3gb
7
vulnerability VCID-pb4n-q6u8-syds
8
vulnerability VCID-teq8-nqhf-xbbq
9
vulnerability VCID-vspr-h3ds-dudq
10
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-rdoc@3.8-6%3Farch=el6cf
11
url pkg:rpm/redhat/thumbslug@0.0.28.1-1?arch=el6_4
purl pkg:rpm/redhat/thumbslug@0.0.28.1-1?arch=el6_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-9qc2-be2u-vfgv
2
vulnerability VCID-c3cm-h13f-jubq
3
vulnerability VCID-ebq1-gkhe-pua7
4
vulnerability VCID-hbtn-7423-m3gb
5
vulnerability VCID-pb4n-q6u8-syds
6
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thumbslug@0.0.28.1-1%3Farch=el6_4
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0686.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0686.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6119.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6119.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6119
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17757
published_at 2026-04-18T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17814
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17976
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18031
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17733
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.1782
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17881
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17897
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17853
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17805
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17748
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6119
3
reference_url http://secunia.com/advisories/52774
reference_id
reference_type
scores
url http://secunia.com/advisories/52774
4
reference_url https://github.com/candlepin/candlepin/blob/master/candlepin.spec
reference_id
reference_type
scores
url https://github.com/candlepin/candlepin/blob/master/candlepin.spec
5
reference_url https://github.com/candlepin/candlepin/commit/f4d93230e58b969c506b4c9778e04482a059b08c
reference_id
reference_type
scores
url https://github.com/candlepin/candlepin/commit/f4d93230e58b969c506b4c9778e04482a059b08c
6
reference_url http://www.osvdb.org/91719
reference_id
reference_type
scores
url http://www.osvdb.org/91719
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=908613
reference_id 908613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=908613
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:candlepinproject:candlepin:0.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.4.11:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.4.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:candlepinproject:candlepin:0.4.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.4.27:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:candlepinproject:candlepin:0.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.4.5:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:candlepinproject:candlepin:0.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.5.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:candlepinproject:candlepin:0.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:candlepinproject:candlepin:0.6.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:subscription_asset_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:subscription_asset_manager:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:1.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:subscription_asset_manager:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:1.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6119
reference_id CVE-2012-6119
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-6119
18
reference_url https://access.redhat.com/errata/RHSA-2013:0686
reference_id RHSA-2013:0686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0686
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score2.1 - 2.1
Exploitability0.5
Weighted_severity1.9
Risk_score0.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-c3cm-h13f-jubq