{"url":"http://public2.vulnerablecode.io/api/packages/126092?format=json","purl":"pkg:rpm/redhat/rpm@4.4.2.3-22.el5_6?arch=3","type":"rpm","namespace":"redhat","name":"rpm","version":"4.4.2.3-22.el5_6","qualifiers":{"arch":"3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34324?format=json","vulnerability_id":"VCID-dd22-xa98-akfh","summary":"Multiple vulnerabilities have been found in RPM, possibly allowing\n    local attackers to gain elevated privileges or remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0815.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0815.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0815","reference_id":"","reference_type":"","scores":[{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91412","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91419","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91448","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.9146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06991","scoring_system":"epss","scoring_elements":"0.91501","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667031","reference_id":"667031","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667031"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=744104","reference_id":"744104","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=744104"},{"reference_url":"https://security.gentoo.org/glsa/201206-26","reference_id":"GLSA-201206-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0451","reference_id":"RHSA-2012:0451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0451"},{"reference_url":"https://usn.ubuntu.com/1695-1/","reference_id":"USN-1695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1695-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0815"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd22-xa98-akfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34323?format=json","vulnerability_id":"VCID-jxdw-h1ey-ffce","summary":"Multiple vulnerabilities have been found in RPM, possibly allowing\n    local attackers to gain elevated privileges or remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0061.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0061","reference_id":"","reference_type":"","scores":[{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.8961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89649","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04947","scoring_system":"epss","scoring_elements":"0.89688","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667031","reference_id":"667031","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667031"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=798585","reference_id":"798585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=798585"},{"reference_url":"https://security.gentoo.org/glsa/201206-26","reference_id":"GLSA-201206-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0451","reference_id":"RHSA-2012:0451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0451"},{"reference_url":"https://usn.ubuntu.com/1695-1/","reference_id":"USN-1695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1695-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0061"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxdw-h1ey-ffce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34322?format=json","vulnerability_id":"VCID-vj49-75q4-zfdn","summary":"Multiple vulnerabilities have been found in RPM, possibly allowing\n    local attackers to gain elevated privileges or remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0060.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0060","reference_id":"","reference_type":"","scores":[{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.8959","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89592","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89602","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89607","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04884","scoring_system":"epss","scoring_elements":"0.89616","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667031","reference_id":"667031","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=667031"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=744858","reference_id":"744858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=744858"},{"reference_url":"https://security.gentoo.org/glsa/201206-26","reference_id":"GLSA-201206-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0451","reference_id":"RHSA-2012:0451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0451"},{"reference_url":"https://usn.ubuntu.com/1695-1/","reference_id":"USN-1695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1695-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0060"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vj49-75q4-zfdn"}],"fixing_vulnerabilities":[],"risk_score":"0.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rpm@4.4.2.3-22.el5_6%3Farch=3"}