Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ge6n-399j-zbbe
SummaryNetworkManager: local users can modify the connection settings
Aliases
0
alias CVE-2009-0578
Fixed_packages
0
url pkg:deb/debian/network-manager-applet@0.7.0.99-1?distro=trixie
purl pkg:deb/debian/network-manager-applet@0.7.0.99-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@0.7.0.99-1%3Fdistro=trixie
1
url pkg:deb/debian/network-manager-applet@0.8.1-2
purl pkg:deb/debian/network-manager-applet@0.8.1-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@0.8.1-2
2
url pkg:deb/debian/network-manager-applet@1.20.0-3?distro=trixie
purl pkg:deb/debian/network-manager-applet@1.20.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@1.20.0-3%3Fdistro=trixie
3
url pkg:deb/debian/network-manager-applet@1.30.0-2?distro=trixie
purl pkg:deb/debian/network-manager-applet@1.30.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@1.30.0-2%3Fdistro=trixie
4
url pkg:deb/debian/network-manager-applet@1.36.0-3?distro=trixie
purl pkg:deb/debian/network-manager-applet@1.36.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@1.36.0-3%3Fdistro=trixie
5
url pkg:deb/debian/network-manager-applet@1.36.0-4?distro=trixie
purl pkg:deb/debian/network-manager-applet@1.36.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@1.36.0-4%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/network-manager-applet@0.6.6-4%2Blenny1
purl pkg:deb/debian/network-manager-applet@0.6.6-4%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2q7z-tuqt-yucv
1
vulnerability VCID-5yfa-e5ub-xkeg
2
vulnerability VCID-ge6n-399j-zbbe
3
vulnerability VCID-j613-86n6-4fgv
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/network-manager-applet@0.6.6-4%252Blenny1
1
url pkg:rpm/redhat/NetworkManager@1:0.7.0-4?arch=el5_3
purl pkg:rpm/redhat/NetworkManager@1:0.7.0-4?arch=el5_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2q7z-tuqt-yucv
1
vulnerability VCID-ge6n-399j-zbbe
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/NetworkManager@1:0.7.0-4%3Farch=el5_3
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0578.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0578.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0578
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14704
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14803
published_at 2026-04-01T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14853
published_at 2026-04-02T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.1493
published_at 2026-04-04T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14732
published_at 2026-04-07T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14822
published_at 2026-04-08T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14877
published_at 2026-04-09T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14838
published_at 2026-04-11T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.148
published_at 2026-04-12T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14742
published_at 2026-04-13T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14636
published_at 2026-04-16T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14644
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0578
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0578
5
reference_url http://secunia.com/advisories/34067
reference_id
reference_type
scores
url http://secunia.com/advisories/34067
6
reference_url http://secunia.com/advisories/34473
reference_id
reference_type
scores
url http://secunia.com/advisories/34473
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49063
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49063
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931
9
reference_url http://www.redhat.com/support/errata/RHSA-2009-0361.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0361.html
10
reference_url http://www.securityfocus.com/bid/33966
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33966
11
reference_url http://www.securitytracker.com/id?1021909
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021909
12
reference_url http://www.ubuntu.com/usn/USN-727-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-727-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=487752
reference_id 487752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=487752
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519801
reference_id 519801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519801
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0578
reference_id CVE-2009-0578
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0578
17
reference_url https://access.redhat.com/errata/RHSA-2009:0361
reference_id RHSA-2009:0361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0361
18
reference_url https://usn.ubuntu.com/727-1/
reference_id USN-727-1
reference_type
scores
url https://usn.ubuntu.com/727-1/
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score6.2 - 6.2
Exploitability0.5
Weighted_severity5.6
Risk_score2.8
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ge6n-399j-zbbe