Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/121445?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/121445?format=api", "purl": "pkg:rpm/redhat/glusterfs@3.7.1-11?arch=el5", "type": "rpm", "namespace": "redhat", "name": "glusterfs", "version": "3.7.1-11", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86295?format=api", "vulnerability_id": "VCID-1v7s-m45t-uka9", "summary": "check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4", "references": [ { "reference_url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" }, { "reference_url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5340.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86435", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86495", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.8649", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86532", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5340" }, { "reference_url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337", "reference_id": "1132337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5340", "reference_id": "CVE-2014-5340", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" } ], "fixed_packages": [], "aliases": [ "CVE-2014-5340" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1v7s-m45t-uka9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86293?format=api", "vulnerability_id": "VCID-4kqn-hmxd-z3a2", "summary": "check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4", "references": [ { "reference_url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes" }, { "reference_url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5338.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52164", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52112", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52148", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52232", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52256", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.5226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52243", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52192", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.522", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5338" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" }, { "reference_url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/69312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69312" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337", "reference_id": "1132337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5338", "reference_id": "CVE-2014-5338", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" } ], "fixed_packages": [], "aliases": [ "CVE-2014-5338" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4kqn-hmxd-z3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86294?format=api", "vulnerability_id": "VCID-529v-bq9y-eyaa", "summary": "check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4", "references": [ { "reference_url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" }, { "reference_url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5339.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67108", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.66973", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67009", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67091", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67077", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67046", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67079", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67074", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67095", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5339" }, { "reference_url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337", "reference_id": "1132337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5339", "reference_id": "CVE-2014-5339", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" } ], "fixed_packages": [], "aliases": [ "CVE-2014-5339" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-529v-bq9y-eyaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15999?format=api", "vulnerability_id": "VCID-y2t3-3pyp-tbd2", "summary": "OpenStack Swift metadata constraints are not correctly enforced\nOpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7960.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53059", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52993", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53033", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53025", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53069", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53064", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52954", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7960" }, { "reference_url": "https://bugs.launchpad.net/swift/+bug/1365350", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openstack/swift", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift" }, { "reference_url": "https://github.com/openstack/swift/commit/06800cbe446ce4c937a57b69517b55c3bba9b6e1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift/commit/06800cbe446ce4c937a57b69517b55c3bba9b6e1" }, { "reference_url": "https://github.com/openstack/swift/commit/2c4622a28ea04e1c6b2382189b0a1f6cccdc9c0f", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift/commit/2c4622a28ea04e1c6b2382189b0a1f6cccdc9c0f" }, { "reference_url": "https://github.com/openstack/swift/commit/5b2c27a5874c2b5b0a333e4955b03544f6a8119f", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift/commit/5b2c27a5874c2b5b0a333e4955b03544f6a8119f" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/07/39", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/08/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "reference_url": "http://www.securityfocus.com/bid/70279", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/70279" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2704-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150461", "reference_id": "1150461", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150461" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7960", "reference_id": "CVE-2014-7960", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7960" }, { "reference_url": "https://github.com/advisories/GHSA-g6x3-55qv-x6p2", "reference_id": "GHSA-g6x3-55qv-x6p2", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-g6x3-55qv-x6p2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0835", "reference_id": "RHSA-2015:0835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0836", "reference_id": "RHSA-2015:0836", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" }, { "reference_url": "https://usn.ubuntu.com/2704-1/", "reference_id": "USN-2704-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2704-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-7960", "GHSA-g6x3-55qv-x6p2" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2t3-3pyp-tbd2" } ], "fixing_vulnerabilities": [], "risk_score": "4.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.7.1-11%3Farch=el5" }