{"url":"http://public2.vulnerablecode.io/api/packages/125877?format=json","purl":"pkg:rpm/redhat/rhev-hypervisor6@6.3-20121012.0?arch=el6_3","type":"rpm","namespace":"redhat","name":"rhev-hypervisor6","version":"6.3-20121012.0","qualifiers":{"arch":"el6_3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87030?format=json","vulnerability_id":"VCID-k9y8-3t9p-8qbz","summary":"kernel: sfc: potential remote denial of service through TCP MSS option","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1323.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1323.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1324.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1324.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1347.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1347.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1375.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1375.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1401.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1401.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1430.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1430.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3412.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3412","reference_id":"","reference_type":"","scores":[{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91494","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.9142","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91443","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91455","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91497","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07001","scoring_system":"epss","scoring_elements":"0.91495","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412"},{"reference_url":"http://secunia.com/advisories/50633","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50633"},{"reference_url":"http://secunia.com/advisories/50732","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50732"},{"reference_url":"http://secunia.com/advisories/50811","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50811"},{"reference_url":"http://secunia.com/advisories/51193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51193"},{"reference_url":"https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c"},{"reference_url":"https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/03/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/08/03/4"},{"reference_url":"http://www.ubuntu.com/usn/USN-1567-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1567-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1568-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1568-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1572-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1572-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1575-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1575-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1577-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1577-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1578-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1578-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1579-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1579-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1580-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1580-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=844714","reference_id":"844714","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=844714"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3412","reference_id":"CVE-2012-3412","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1323","reference_id":"RHSA-2012:1323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1347","reference_id":"RHSA-2012:1347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1366","reference_id":"RHSA-2012:1366","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1366"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1375","reference_id":"RHSA-2012:1375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1401","reference_id":"RHSA-2012:1401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1430","reference_id":"RHSA-2012:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1430"},{"reference_url":"https://usn.ubuntu.com/1567-1/","reference_id":"USN-1567-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1567-1/"},{"reference_url":"https://usn.ubuntu.com/1568-1/","reference_id":"USN-1568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1568-1/"},{"reference_url":"https://usn.ubuntu.com/1572-1/","reference_id":"USN-1572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1572-1/"},{"reference_url":"https://usn.ubuntu.com/1573-1/","reference_id":"USN-1573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1573-1/"},{"reference_url":"https://usn.ubuntu.com/1574-1/","reference_id":"USN-1574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1574-1/"},{"reference_url":"https://usn.ubuntu.com/1575-1/","reference_id":"USN-1575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1575-1/"},{"reference_url":"https://usn.ubuntu.com/1577-1/","reference_id":"USN-1577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1577-1/"},{"reference_url":"https://usn.ubuntu.com/1578-1/","reference_id":"USN-1578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1578-1/"},{"reference_url":"https://usn.ubuntu.com/1579-1/","reference_id":"USN-1579-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1579-1/"},{"reference_url":"https://usn.ubuntu.com/1580-1/","reference_id":"USN-1580-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1580-1/"}],"fixed_packages":[],"aliases":["CVE-2012-3412"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9y8-3t9p-8qbz"}],"fixing_vulnerabilities":[],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhev-hypervisor6@6.3-20121012.0%3Farch=el6_3"}