{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T20:59:32.233","vulnerabilities":[{"cve":{"id":"CVE-2012-3448","sourceIdentifier":"secalert@redhat.com","published":"2012-08-06T18:55:01.197","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Ganglia Web before 3.5.1 allows remote attackers to execute arbitrary PHP code via unknown attack vectors."},{"lang":"es","value":"Vulnerabilidad no especificada en Ganglia Web anterior a v3.5.1 permite a atacantes remotos a ejecutar comandos PHP a través de vectores de ataque desconocidos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*","versionEndIncluding":"3.5.0","matchCriteriaId":"08DCA131-407A-4196-925B-80AFD3FBA02A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"E95DD90F-69C4-4861-BC7E-5B3C11B6827B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"1AAC2B01-943B-47F9-846A-69705B9DC947"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"21788841-C2E8-443B-8A39-429A583689AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"B4B8F2C7-4526-4EA9-AF86-F46D71C4CD5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"3A045D9D-4535-4389-8B65-A5F0E7CA2173"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"2AD09224-3B74-4825-91C9-7710E81F480B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.7:*:*:*:*:*:*:*","matchCriteriaId":"4C285B26-94DC-452A-83D7-A74FB04EB1B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.1.8:*:*:*:*:*:*:*","matchCriteriaId":"2DCAFCD2-E035-457E-BC8C-7E9DAFA9322F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"CF00F439-F811-4784-9D15-43E1899D8A2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:3.3.0:*:*:*:*:*:*:*","matchCriteriaId":"74DA7C86-7B22-4881-98B8-704F0A701334"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"A03EB5D6-9EF5-416D-A1ED-2BCFD8D25350"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:3.4.1:*:*:*:*:*:*:*","matchCriteriaId":"8EE4F28D-DFCF-4D00-97D8-D62F3A9C1ECE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ganglia:ganglia-web:3.4.2:*:*:*:*:*:*:*","matchCriteriaId":"483FFF2D-73F8-4006-BE65-A13FA3D032B6"}]}]}],"references":[{"url":"http://ganglia.info/?p=549","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html","source":"secalert@redhat.com"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/50047","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://www.debian.org/security/2013/dsa-2610","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2012/08/02/1","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/bid/54699","source":"secalert@redhat.com"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=428776","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=845124","source":"secalert@redhat.com"},{"url":"https://www.exploit-db.com/exploits/38030/","source":"secalert@redhat.com"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html","source":"secalert@redhat.com"},{"url":"http://ganglia.info/?p=549","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/50047","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.debian.org/security/2013/dsa-2610","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2012/08/02/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/54699","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=428776","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=845124","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/38030/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}