Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-4cvx-j5g1-23hx
SummaryThe clear_volume function in LVMVolumeDriver driver in OpenStack Cinder 2013.1.1 through 2013.1.2 does not properly clear data when deleting a snapshot, which allows local users to obtain sensitive information via unspecified vectors.
Aliases
0
alias CVE-2013-4183
1
alias GHSA-q3rw-wcj6-8cjf
2
alias PYSEC-2013-35
Fixed_packages
0
url pkg:deb/debian/cinder@2013.1.2-4?distro=trixie
purl pkg:deb/debian/cinder@2013.1.2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cinder@2013.1.2-4%3Fdistro=trixie
1
url pkg:deb/debian/cinder@2:17.0.1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/cinder@2:17.0.1-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cinder@2:17.0.1-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/cinder@2:21.3.1-1~deb12u1?distro=trixie
purl pkg:deb/debian/cinder@2:21.3.1-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cinder@2:21.3.1-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/cinder@2:26.0.0-2?distro=trixie
purl pkg:deb/debian/cinder@2:26.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cinder@2:26.0.0-2%3Fdistro=trixie
4
url pkg:deb/debian/cinder@2:28.0.0~rc2-1?distro=trixie
purl pkg:deb/debian/cinder@2:28.0.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cinder@2:28.0.0~rc2-1%3Fdistro=trixie
5
url pkg:deb/debian/cinder@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/cinder@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cinder@2:28.0.0-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/openstack-cinder@2013.1.3-2?arch=el6ost
purl pkg:rpm/redhat/openstack-cinder@2013.1.3-2?arch=el6ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4cvx-j5g1-23hx
1
vulnerability VCID-kgrz-64rh-cbdd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-cinder@2013.1.3-2%3Farch=el6ost
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-1198.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1198.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4183.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4183
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.3644
published_at 2026-04-02T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36067
published_at 2026-04-24T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36298
published_at 2026-04-21T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36352
published_at 2026-04-18T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36368
published_at 2026-04-16T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36327
published_at 2026-04-13T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36349
published_at 2026-04-12T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36384
published_at 2026-04-11T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36377
published_at 2026-04-09T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36356
published_at 2026-04-08T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36308
published_at 2026-04-07T12:55:00Z
11
value 0.00156
scoring_system epss
scoring_elements 0.36473
published_at 2026-04-04T12:55:00Z
12
value 0.00156
scoring_system epss
scoring_elements 0.36251
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4183
3
reference_url https://bugs.launchpad.net/cinder/+bug/1198185
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/cinder/+bug/1198185
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4183
5
reference_url https://github.com/openstack/cinder
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/cinder
6
reference_url https://github.com/openstack/cinder/commit/0ee31073c5cb432a9cdd2648e99aa802b0ed0a17
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/cinder/commit/0ee31073c5cb432a9cdd2648e99aa802b0ed0a17
7
reference_url https://github.com/openstack/cinder/commit/68c597e26b5659a036a7a937622e539bac102308
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/cinder/commit/68c597e26b5659a036a7a937622e539bac102308
8
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/cinder/PYSEC-2013-35.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/cinder/PYSEC-2013-35.yaml
9
reference_url https://rhn.redhat.com/errata/RHSA-2013-1198.html
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2013-1198.html
10
reference_url https://www.ubuntu.com/usn/USN-2005-1
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.ubuntu.com/usn/USN-2005-1
11
reference_url http://www.ubuntu.com/usn/USN-2005-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2005-1
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719010
reference_id 719010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719010
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=994355
reference_id 994355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=994355
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4183
reference_id CVE-2013-4183
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4183
15
reference_url https://github.com/advisories/GHSA-q3rw-wcj6-8cjf
reference_id GHSA-q3rw-wcj6-8cjf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q3rw-wcj6-8cjf
16
reference_url https://access.redhat.com/errata/RHSA-2013:1198
reference_id RHSA-2013:1198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1198
17
reference_url https://usn.ubuntu.com/2005-1/
reference_id USN-2005-1
reference_type
scores
url https://usn.ubuntu.com/2005-1/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-4cvx-j5g1-23hx