Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/92462?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92462?format=api", "vulnerability_id": "VCID-578u-3ew5-qyh5", "summary": "Multiple directory traversal vulnerabilities in ZoneMinder 1.24.x before 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) view, (2) request, or (3) action parameter.", "aliases": [ { "alias": "CVE-2013-0332" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/944005?format=api", "purl": "pkg:deb/debian/zoneminder@1.25.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.25.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049097?format=api", "purl": "pkg:deb/debian/zoneminder@1.25.0-4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11zt-rw3z-87gx" }, { "vulnerability": "VCID-23ug-uzth-tybf" }, { "vulnerability": "VCID-35hj-x1e2-eug1" }, { "vulnerability": "VCID-3zrk-nztf-nqfd" }, { "vulnerability": "VCID-4zbd-b8b7-tfa4" }, { "vulnerability": "VCID-5ba3-bxk1-pbht" }, { "vulnerability": "VCID-694p-mbsg-e7f6" }, { "vulnerability": "VCID-6mdb-h6fb-c7d6" }, { "vulnerability": "VCID-6xnz-k4kg-eqhd" }, { "vulnerability": "VCID-7x1r-12y1-ekfk" }, { "vulnerability": "VCID-8uu9-g2r8-nyep" }, { "vulnerability": "VCID-8vh1-pk4c-63hz" }, { "vulnerability": "VCID-9rr3-tdb4-1kdm" }, { "vulnerability": "VCID-aqfu-4m9a-hbd4" }, { "vulnerability": "VCID-cccj-wgfh-3fg4" }, { "vulnerability": "VCID-dk87-j5dz-6bed" }, { "vulnerability": "VCID-dp5c-4aaa-uyaq" }, { "vulnerability": "VCID-dpp2-3t2d-d3e4" }, { "vulnerability": "VCID-dz5v-tqce-a7ew" }, { "vulnerability": "VCID-edec-sj6n-n7d7" }, { "vulnerability": "VCID-f9wt-f98j-ekeh" }, { "vulnerability": "VCID-fnhr-cs7k-gkeu" }, { "vulnerability": "VCID-g1r5-fbsj-n3dr" }, { "vulnerability": "VCID-hpah-sv5y-8bde" }, { "vulnerability": "VCID-jmdh-m4ty-gqch" }, { "vulnerability": "VCID-kgpe-97pr-suee" }, { "vulnerability": "VCID-mx9e-1cur-mqfz" }, { "vulnerability": "VCID-p916-xnk3-rkce" }, { "vulnerability": "VCID-pr1z-g8aw-tqez" }, { "vulnerability": "VCID-qn8h-k43x-p7cs" }, { "vulnerability": "VCID-qs2j-ektc-2kf9" }, { "vulnerability": "VCID-qxmt-szsx-y7a8" }, { "vulnerability": "VCID-qxtk-taxx-1kde" }, { "vulnerability": "VCID-r3pj-815v-uubu" }, { "vulnerability": "VCID-r4zz-6j52-cue5" }, { "vulnerability": "VCID-r751-csse-zuaq" }, { "vulnerability": "VCID-rdyb-mgsn-gyb5" }, { "vulnerability": "VCID-sdf7-gmgd-pkf8" }, { "vulnerability": "VCID-t5fd-hvgs-sue7" }, { "vulnerability": "VCID-ug2b-2eg5-jfbb" }, { "vulnerability": "VCID-ukjs-5za3-xqdb" }, { "vulnerability": "VCID-v56x-raf9-kydq" }, { "vulnerability": "VCID-w96c-3tde-d7b1" }, { "vulnerability": "VCID-wdng-puzu-5kah" }, { "vulnerability": "VCID-xj45-xv47-ruhe" }, { "vulnerability": "VCID-y3vt-x7b1-4yer" }, { "vulnerability": "VCID-ys4w-ngmr-mbh9" }, { "vulnerability": "VCID-yxpy-5fmj-cbb7" }, { "vulnerability": "VCID-zu3w-apm5-8bdw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.25.0-4" }, { "url": "http://public2.vulnerablecode.io/api/packages/943998?format=api", "purl": "pkg:deb/debian/zoneminder@1.34.23-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3xuk-942c-kkbf" }, { "vulnerability": "VCID-4mfm-zzrx-6ffb" }, { "vulnerability": "VCID-4qtk-7myx-vfcd" }, { "vulnerability": "VCID-7vc9-wfjb-t3ba" }, { "vulnerability": "VCID-7x51-uyq2-9qax" }, { "vulnerability": "VCID-95ub-6q5w-p3cm" }, { "vulnerability": "VCID-9kh5-715y-pud4" }, { "vulnerability": "VCID-d117-rhnc-rkhf" }, { "vulnerability": "VCID-fyy1-fwys-xkbj" }, { "vulnerability": "VCID-j283-1m9p-13hn" }, { "vulnerability": "VCID-jukn-h868-5ugm" }, { "vulnerability": "VCID-kk5d-y2z8-r3g2" }, { "vulnerability": "VCID-mdkd-vmcp-afa8" }, { "vulnerability": "VCID-mk5h-586t-pyga" }, { "vulnerability": "VCID-n8y3-5fb9-kucb" }, { "vulnerability": "VCID-tyu6-8h17-8yh5" }, { "vulnerability": "VCID-uybk-r4q9-gyac" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.34.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943996?format=api", "purl": "pkg:deb/debian/zoneminder@1.36.33%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3xuk-942c-kkbf" }, { "vulnerability": "VCID-4mfm-zzrx-6ffb" }, { "vulnerability": "VCID-7x51-uyq2-9qax" }, { "vulnerability": "VCID-mdkd-vmcp-afa8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.36.33%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/944000?format=api", "purl": "pkg:deb/debian/zoneminder@1.36.35%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.36.35%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943999?format=api", "purl": "pkg:deb/debian/zoneminder@1.36.37%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.36.37%252Bdfsg1-1%3Fdistro=trixie" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049096?format=api", "purl": "pkg:deb/debian/zoneminder@1.24.2-8%2Bsqueeze1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-11zt-rw3z-87gx" }, { "vulnerability": "VCID-23ug-uzth-tybf" }, { "vulnerability": "VCID-35hj-x1e2-eug1" }, { "vulnerability": "VCID-3zrk-nztf-nqfd" }, { "vulnerability": "VCID-4zbd-b8b7-tfa4" }, { "vulnerability": "VCID-578u-3ew5-qyh5" }, { "vulnerability": "VCID-5ba3-bxk1-pbht" }, { "vulnerability": "VCID-694p-mbsg-e7f6" }, { "vulnerability": "VCID-6mdb-h6fb-c7d6" }, { "vulnerability": "VCID-6xnz-k4kg-eqhd" }, { "vulnerability": "VCID-7x1r-12y1-ekfk" }, { "vulnerability": "VCID-8uu9-g2r8-nyep" }, { "vulnerability": "VCID-8vh1-pk4c-63hz" }, { "vulnerability": "VCID-9rr3-tdb4-1kdm" }, { "vulnerability": "VCID-aqfu-4m9a-hbd4" }, { "vulnerability": "VCID-cccj-wgfh-3fg4" }, { "vulnerability": "VCID-dk87-j5dz-6bed" }, { "vulnerability": "VCID-dp5c-4aaa-uyaq" }, { "vulnerability": "VCID-dpp2-3t2d-d3e4" }, { "vulnerability": "VCID-dz5v-tqce-a7ew" }, { "vulnerability": "VCID-edec-sj6n-n7d7" }, { "vulnerability": "VCID-f9wt-f98j-ekeh" }, { "vulnerability": "VCID-fnhr-cs7k-gkeu" }, { "vulnerability": "VCID-g1r5-fbsj-n3dr" }, { "vulnerability": "VCID-hpah-sv5y-8bde" }, { "vulnerability": "VCID-jmdh-m4ty-gqch" }, { "vulnerability": "VCID-kgpe-97pr-suee" }, { "vulnerability": "VCID-mx9e-1cur-mqfz" }, { "vulnerability": "VCID-p916-xnk3-rkce" }, { "vulnerability": "VCID-pr1z-g8aw-tqez" }, { "vulnerability": "VCID-qn8h-k43x-p7cs" }, { "vulnerability": "VCID-qs2j-ektc-2kf9" }, { "vulnerability": "VCID-qxmt-szsx-y7a8" }, { "vulnerability": "VCID-qxtk-taxx-1kde" }, { "vulnerability": "VCID-r3pj-815v-uubu" }, { "vulnerability": "VCID-r4zz-6j52-cue5" }, { "vulnerability": "VCID-r751-csse-zuaq" }, { "vulnerability": "VCID-rdyb-mgsn-gyb5" }, { "vulnerability": "VCID-sdf7-gmgd-pkf8" }, { "vulnerability": "VCID-t5fd-hvgs-sue7" }, { "vulnerability": "VCID-tj5u-pm5u-4ug6" }, { "vulnerability": "VCID-ug2b-2eg5-jfbb" }, { "vulnerability": "VCID-ukjs-5za3-xqdb" }, { "vulnerability": "VCID-v56x-raf9-kydq" }, { "vulnerability": "VCID-w96c-3tde-d7b1" }, { "vulnerability": "VCID-wdng-puzu-5kah" }, { "vulnerability": "VCID-xj45-xv47-ruhe" }, { "vulnerability": "VCID-y3vt-x7b1-4yer" }, { "vulnerability": "VCID-ys4w-ngmr-mbh9" }, { "vulnerability": "VCID-yxpy-5fmj-cbb7" }, { "vulnerability": "VCID-zu3w-apm5-8bdw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.24.2-8%252Bsqueeze1" } ], "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96807", "published_at": "2026-05-16T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96725", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96741", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96748", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96752", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96761", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96768", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96767", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96769", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96772", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96781", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96784", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96789", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96791", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96795", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.31131", "scoring_system": "epss", "scoring_elements": "0.96804", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0332" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2640", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2640" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/21/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/21/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/02/21/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/02/21/9" }, { "reference_url": "http://www.zoneminder.com/forums/viewtopic.php?f=1&t=17979", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zoneminder.com/forums/viewtopic.php?f=1&t=17979" }, { "reference_url": "http://www.zoneminder.com/wiki/index.php/Change_History", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zoneminder.com/wiki/index.php/Change_History" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912", "reference_id": "700912", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0332", "reference_id": "CVE-2013-0332", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0332" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/17593.txt", "reference_id": "OSVDB-74198;CVE-2013-0332", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/17593.txt" } ], "weaknesses": [ { "cwe_id": 22, "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "description": "The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory." } ], "exploits": [ { "date_added": "2013-01-24", "description": "ZoneMinder Video Server - packageControl Command Execution (Metasploit)", "required_action": null, "due_date": null, "notes": null, "known_ransomware_campaign_use": true, "source_date_published": "2013-01-24", "exploit_type": "remote", "platform": "unix", "source_date_updated": "2013-01-24", "data_source": "Exploit-DB", "source_url": "" } ], "severity_range_score": "5.0 - 5.0", "exploitability": "2.0", "weighted_severity": "4.5", "risk_score": 9.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-578u-3ew5-qyh5" }