Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/56464?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56464?format=api", "vulnerability_id": "VCID-6x8y-ffja-k3cw", "summary": "Client BlockTokens not checked in Apache Hadoop\nDataNodes in Apache Hadoop 2.0.0 alpha does not check the BlockTokens of clients when Kerberos is enabled and the DataNode has checked out the same BlockPool twice from a NodeName, which might allow remote clients to read arbitrary blocks, write to blocks to which they only have read access, and have other unspecified impacts.", "aliases": [ { "alias": "CVE-2012-3376" }, { "alias": "GHSA-qmh2-h7r6-gm6q" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83051?format=api", "purl": "pkg:maven/org.apache.hadoop/hadoop-client@2.0.1-alpha", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1jer-fvap-a3et" }, { "vulnerability": "VCID-417a-z2w6-s3bq" }, { "vulnerability": "VCID-s1ru-ts2c-ubf5" }, { "vulnerability": "VCID-teju-geqm-j7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-client@2.0.1-alpha" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83050?format=api", "purl": "pkg:maven/org.apache.hadoop/hadoop-client@2.0.0-alpha", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1jer-fvap-a3et" }, { "vulnerability": "VCID-6x8y-ffja-k3cw" }, { "vulnerability": "VCID-teju-geqm-j7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.hadoop/hadoop-client@2.0.0-alpha" } ], "references": [ { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0049.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0049.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3376", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76543", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76565", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.7657", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.7654", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76583", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79741", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79728", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79686", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01302", "scoring_system": "epss", "scoring_elements": "0.79757", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3376" }, { "reference_url": "https://github.com/apache/hadoop", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/hadoop" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3376", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3376" }, { "reference_url": "https://seclists.org/fulldisclosure/2012/Jul/78", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://seclists.org/fulldisclosure/2012/Jul/78" }, { "reference_url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html" }, { "reference_url": "https://github.com/advisories/GHSA-qmh2-h7r6-gm6q", "reference_id": "GHSA-qmh2-h7r6-gm6q", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qmh2-h7r6-gm6q" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 310, "name": "Cryptographic Issues", "description": "Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6x8y-ffja-k3cw" }