Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/117457?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/117457?format=api", "purl": "pkg:rpm/redhat/python-anyjson@0.3.3-4?arch=el6sat", "type": "rpm", "namespace": "redhat", "name": "python-anyjson", "version": "0.3.3-4", "qualifiers": { "arch": "el6sat" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6858?format=api", "vulnerability_id": "VCID-1mw1-384y-huc7", "summary": "Uncontrolled Resource Consumption\nAlgorithmic complexity vulnerability in the `ssl.match_hostname` function and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.", "references": [ { "reference_url": "http://bugs.python.org/issue17980", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.python.org/issue17980" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2099.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2099.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2099", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89929", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89942", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.8997", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89978", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05238", "scoring_system": "epss", "scoring_elements": "0.89969", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2099" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2099" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2099" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709066", "reference_id": "709066", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709066" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709067", "reference_id": "709067", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709067" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709068", "reference_id": "709068", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709068" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709069", "reference_id": "709069", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709069" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709070", "reference_id": "709070", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709070" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=963260", "reference_id": "963260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=963260" }, { "reference_url": "https://security.gentoo.org/glsa/201401-04", "reference_id": "GLSA-201401-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1263", "reference_id": "RHSA-2014:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1690", "reference_id": "RHSA-2014:1690", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1690" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0042", "reference_id": "RHSA-2015:0042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1166", "reference_id": "RHSA-2016:1166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1166" }, { "reference_url": "https://usn.ubuntu.com/1983-1/", "reference_id": "USN-1983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1983-1/" }, { "reference_url": "https://usn.ubuntu.com/1984-1/", "reference_id": "USN-1984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1984-1/" }, { "reference_url": "https://usn.ubuntu.com/1985-1/", "reference_id": "USN-1985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1985-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2099" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1mw1-384y-huc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85737?format=api", "vulnerability_id": "VCID-1yu9-avtx-cybv", "summary": "foreman: API not scoping resources to taxonomies", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1844.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1844.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1844", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49444", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49499", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49452", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.4952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49491", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00261", "scoring_system": "epss", "scoring_elements": "0.49494", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1844" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207589", "reference_id": "1207589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207589" } ], "fixed_packages": [], "aliases": [ "CVE-2015-1844" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yu9-avtx-cybv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85949?format=api", "vulnerability_id": "VCID-77c9-jb1m-6qe2", "summary": "qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0203.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94968", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94972", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16987", "scoring_system": "epss", "scoring_elements": "0.94981", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0203" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181721", "reference_id": "1181721", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0660", "reference_id": "RHSA-2015:0660", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0660" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0661", "reference_id": "RHSA-2015:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0662", "reference_id": "RHSA-2015:0662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0707", "reference_id": "RHSA-2015:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0707" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0708", "reference_id": "RHSA-2015:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0708" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0203" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-77c9-jb1m-6qe2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85693?format=api", "vulnerability_id": "VCID-7f1h-1fw8-k7c4", "summary": "foreman: the _session_id cookie is issued without the Secure flag", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3155.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68193", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.683", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68254", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216035", "reference_id": "1216035", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216035" } ], "fixed_packages": [], "aliases": [ "CVE-2015-3155" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7f1h-1fw8-k7c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86129?format=api", "vulnerability_id": "VCID-8wen-twwa-8khm", "summary": "foreman: cross-site scripting (XSS) flaw in template preview screen", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3653.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3653.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59891", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59968", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59993", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60026", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60047", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60032", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60014", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3653" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145398", "reference_id": "1145398", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145398" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3653" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8wen-twwa-8khm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85870?format=api", "vulnerability_id": "VCID-9gb8-xvrc-aqgb", "summary": "qpid-cpp: anonymous access to qpidd cannot be prevented", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0223.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84601", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84623", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02275", "scoring_system": "epss", "scoring_elements": "0.84659", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0223" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186308", "reference_id": "1186308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0660", "reference_id": "RHSA-2015:0660", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0660" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0661", "reference_id": "RHSA-2015:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0662", "reference_id": "RHSA-2015:0662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0707", "reference_id": "RHSA-2015:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0707" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0708", "reference_id": "RHSA-2015:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0708" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0223" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gb8-xvrc-aqgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15630?format=api", "vulnerability_id": "VCID-f5vu-k9rc-27fz", "summary": "Improper Validation of Array Index\nArray index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.", "references": [ { "reference_url": "http://bugs.python.org/issue21529", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://bugs.python.org/issue21529" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00015.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00015.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/06/24/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://openwall.com/lists/oss-security/2014/06/24/7" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1064.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1064.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4616.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.6812", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68139", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68182", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00557", "scoring_system": "epss", "scoring_elements": "0.68194", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4616" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112285", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112285" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4616" }, { "reference_url": "https://github.com/simplejson/simplejson", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/simplejson/simplejson" }, { "reference_url": "https://hackerone.com/reports/12297", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://hackerone.com/reports/12297" }, { "reference_url": "https://security.gentoo.org/glsa/201503-10", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/201503-10" }, { "reference_url": "http://www.securityfocus.com/bid/68119", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/68119" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4616", "reference_id": "CVE-2014-4616", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4616" }, { "reference_url": "https://github.com/advisories/GHSA-9772-cwx9-r4cj", "reference_id": "GHSA-9772-cwx9-r4cj", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9772-cwx9-r4cj" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1064", "reference_id": "RHSA-2015:1064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2101", "reference_id": "RHSA-2015:2101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2101" }, { "reference_url": "https://usn.ubuntu.com/2653-1/", "reference_id": "USN-2653-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2653-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-4616", "GHSA-9772-cwx9-r4cj" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f5vu-k9rc-27fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60423?format=api", "vulnerability_id": "VCID-fq2t-c2nv-23ce", "summary": "A vulnerability in MongoDB can lead to a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1609.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1609.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1609", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82215", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82264", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82257", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01693", "scoring_system": "epss", "scoring_elements": "0.82252", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1609" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200446", "reference_id": "1200446", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200446" }, { "reference_url": "https://security.gentoo.org/glsa/201611-13", "reference_id": "GLSA-201611-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201611-13" } ], "fixed_packages": [], "aliases": [ "CVE-2015-1609" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fq2t-c2nv-23ce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85807?format=api", "vulnerability_id": "VCID-jfqz-9a6e-jff7", "summary": "foreman: Unprivileged user can access private bookmarks of other users", "references": [ { "reference_url": "http://projects.theforeman.org/issues/13828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://projects.theforeman.org/issues/13828" }, { "reference_url": "https://access.redhat.com/errata/RHBA-2016:1500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2016:1500" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2100.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2100.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2100", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4227", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42284", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42306", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2100" }, { "reference_url": "http://theforeman.org/security.html#2016-2100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://theforeman.org/security.html#2016-2100" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/31/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/03/31/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310675", "reference_id": "1310675", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310675" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:1.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:theforeman:foreman:1.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:1.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:1.11.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:theforeman:foreman:1.11.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:theforeman:foreman:1.11.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2100", "reference_id": "CVE-2016-2100", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2100" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2100" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfqz-9a6e-jff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85795?format=api", "vulnerability_id": "VCID-rc65-py17-kuhm", "summary": "foreman: lack of SSL certificate validation when performing LDAPS authentication", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1816.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1816.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1816", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44287", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44292", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44309", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44277", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1816" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208602", "reference_id": "1208602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208602" } ], "fixed_packages": [], "aliases": [ "CVE-2015-1816" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rc65-py17-kuhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85617?format=api", "vulnerability_id": "VCID-sqjb-qpyd-p7gn", "summary": "foreman: edit_users permission allows changing of admin passwords", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3235.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68522", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.6854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68537", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68588", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68631", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0057", "scoring_system": "epss", "scoring_elements": "0.68589", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3235" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232366", "reference_id": "1232366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1232366" } ], "fixed_packages": [], "aliases": [ "CVE-2015-3235" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqjb-qpyd-p7gn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5397?format=api", "vulnerability_id": "VCID-tbug-mv5x-uucb", "summary": "The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, which allows remote attackers to perform replay attacks via a signed URL.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1591", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2015:1591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1592", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2015:1592" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4346.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4346.json" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2013-4346", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2013-4346" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4346", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64597", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64544", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4346" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007746", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007746" }, { "reference_url": "https://github.com/joestump/python-oauth2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/joestump/python-oauth2" }, { "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauth2/PYSEC-2014-85.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauth2/PYSEC-2014-85.yaml" }, { "reference_url": "https://github.com/simplegeo/python-oauth2/issues/129", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/simplegeo/python-oauth2/issues/129" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4346", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4346" }, { "reference_url": "https://web.archive.org/web/20200228063302/http://www.securityfocus.com/bid/62386", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20200228063302/http://www.securityfocus.com/bid/62386" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/09/12/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2013/09/12/7" }, { "reference_url": "http://www.securityfocus.com/bid/62386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/62386" }, { "reference_url": "https://github.com/advisories/GHSA-4433-4cxq-vv73", "reference_id": "GHSA-4433-4cxq-vv73", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-4433-4cxq-vv73" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4346", "GHSA-4433-4cxq-vv73", "PYSEC-2014-85" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tbug-mv5x-uucb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86174?format=api", "vulnerability_id": "VCID-utxw-251d-gfff", "summary": "rhn_satellite_6: cross-site request forgery (CSRF) can force logout", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3590.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47402", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47407", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47456", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47462", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3590" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128108", "reference_id": "1128108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128108" } ], "fixed_packages": [], "aliases": [ "CVE-2014-3590" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-utxw-251d-gfff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85866?format=api", "vulnerability_id": "VCID-vhxh-tpay-mbh3", "summary": "qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178606.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178606.html" }, { "reference_url": "http://mail-archives.apache.org/mod_mbox/www-announce/201501.mbox/%3C54C60497.5060504%40apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201501.mbox/%3C54C60497.5060504%40apache.org%3E" }, { "reference_url": "http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0660.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0660.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0661.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0661.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0662.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0662.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0707.html" }, { "reference_url": "https://access.redhat.com/errata/RHBA-2016:1500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2016:1500" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0224.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0224.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0224", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98102", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98101", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98083", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.9809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98095", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.5601", "scoring_system": "epss", "scoring_elements": "0.98096", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0224" }, { "reference_url": "https://issues.apache.org/jira/browse/QPID-6310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.apache.org/jira/browse/QPID-6310" }, { "reference_url": "http://www.securityfocus.com/archive/1/534545/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/534545/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/72317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72317" }, { "reference_url": "http://www.securitytracker.com/id/1031872", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1031872" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186302", "reference_id": "1186302", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186302" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0224", "reference_id": "CVE-2015-0224", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0660", "reference_id": "RHSA-2015:0660", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0660" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0661", "reference_id": "RHSA-2015:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0662", "reference_id": "RHSA-2015:0662", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0707", "reference_id": "RHSA-2015:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0707" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0708", "reference_id": "RHSA-2015:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0708" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0224" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhxh-tpay-mbh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5398?format=api", "vulnerability_id": "VCID-zkgb-14kz-33dz", "summary": "The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1591", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2015:1591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1592", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2015:1592" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4347.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4347.json" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2013-4347", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2013-4347" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4347", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61276", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.614", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61436", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4347" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007758", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007758" }, { "reference_url": "https://github.com/joestump/python-oauth2", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/joestump/python-oauth2" }, { "reference_url": "https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650" }, { "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauth2/PYSEC-2014-86.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pypa/advisory-database/tree/main/vulns/oauth2/PYSEC-2014-86.yaml" }, { "reference_url": "https://github.com/simplegeo/python-oauth2/issues/9", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/simplegeo/python-oauth2/issues/9" }, { "reference_url": "https://github.com/simplegeo/python-oauth2/pull/146", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/simplegeo/python-oauth2/pull/146" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4347", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4347" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/09/12/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2013/09/12/7" }, { "reference_url": "http://www.securityfocus.com/bid/62388", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/62388" }, { "reference_url": "https://github.com/advisories/GHSA-rv8h-p43r-4x5r", "reference_id": "GHSA-rv8h-p43r-4x5r", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-rv8h-p43r-4x5r" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4347", "GHSA-rv8h-p43r-4x5r", "PYSEC-2014-86" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkgb-14kz-33dz" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-anyjson@0.3.3-4%3Farch=el6sat" }