{"url":"http://public2.vulnerablecode.io/api/packages/125929?format=json","purl":"pkg:rpm/redhat/qpid-cpp@0.14-22?arch=el6_3","type":"rpm","namespace":"redhat","name":"qpid-cpp","version":"0.14-22","qualifiers":{"arch":"el6_3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87094?format=json","vulnerability_id":"VCID-5jcn-tn7y-ufhp","summary":"qpid-cpp: not closing incomplete connections exhausts file descriptors, leading to DoS","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1269.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1269.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1277.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1277.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2145.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2145","reference_id":"","reference_type":"","scores":[{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91627","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.9154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91585","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.9158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91597","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.9161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91619","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0715","scoring_system":"epss","scoring_elements":"0.91618","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2145"},{"reference_url":"http://secunia.com/advisories/50573","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50573"},{"reference_url":"http://secunia.com/advisories/50698","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50698"},{"reference_url":"http://secunia.com/advisories/50699","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50699"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78730","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78730"},{"reference_url":"https://issues.apache.org/jira/browse/QPID-2616","reference_id":"","reference_type":"","scores":[],"url":"https://issues.apache.org/jira/browse/QPID-2616"},{"reference_url":"https://issues.apache.org/jira/browse/QPID-4021","reference_id":"","reference_type":"","scores":[],"url":"https://issues.apache.org/jira/browse/QPID-4021"},{"reference_url":"http://www.securityfocus.com/bid/55608","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55608"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=817175","reference_id":"817175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=817175"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2145","reference_id":"CVE-2012-2145","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1269","reference_id":"RHSA-2012:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1277","reference_id":"RHSA-2012:1277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1277"}],"fixed_packages":[],"aliases":["CVE-2012-2145"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5jcn-tn7y-ufhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54928?format=json","vulnerability_id":"VCID-9gnt-h956-gqft","summary":"Apache QPID Allows Remote Authentication Bypass\nApache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1277.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1277.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1279.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1279.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3467.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3467","reference_id":"","reference_type":"","scores":[{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78608","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78555","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78579","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78595","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78592","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.7841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78468","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01146","scoring_system":"epss","scoring_elements":"0.78461","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3467"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=836276","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=836276"},{"reference_url":"http://secunia.com/advisories/50186","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50186"},{"reference_url":"http://secunia.com/advisories/50698","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50698"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77568","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77568"},{"reference_url":"https://github.com/apache/qpid","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/qpid"},{"reference_url":"https://issues.apache.org/jira/browse/QPID-3849","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/QPID-3849"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3467","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3467"},{"reference_url":"http://svn.apache.org/viewvc?view=revision&revision=1352992","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc?view=revision&revision=1352992"},{"reference_url":"https://web.archive.org/web/20200229113556/http://www.securityfocus.com/bid/54954","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200229113556/http://www.securityfocus.com/bid/54954"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/09/6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2012/08/09/6"},{"reference_url":"http://www.securityfocus.com/bid/54954","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/54954"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/advisories/GHSA-phw8-fw9g-v3xc","reference_id":"GHSA-phw8-fw9g-v3xc","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-phw8-fw9g-v3xc"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1277","reference_id":"RHSA-2012:1277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1279","reference_id":"RHSA-2012:1279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1279"}],"fixed_packages":[],"aliases":["CVE-2012-3467","GHSA-phw8-fw9g-v3xc"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9gnt-h956-gqft"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/qpid-cpp@0.14-22%3Farch=el6_3"}