Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/libdnet@1.12-11?arch=el6cf
Typerpm
Namespaceredhat
Namelibdnet
Version1.12-11
Qualifiers
arch el6cf
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-23ur-7nqb-tybr
vulnerability_id VCID-23ur-7nqb-tybr
summary EVM: CSRF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0185.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0185
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27047
published_at 2026-04-18T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27074
published_at 2026-04-16T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27175
published_at 2026-04-01T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27215
published_at 2026-04-02T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27253
published_at 2026-04-04T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27046
published_at 2026-04-07T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27115
published_at 2026-04-08T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27161
published_at 2026-04-09T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27167
published_at 2026-04-11T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27123
published_at 2026-04-12T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27065
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0185
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=895345
reference_id 895345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=895345
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0185
reference_id CVE-2013-0185
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2013-0185
fixed_packages
aliases CVE-2013-0185
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23ur-7nqb-tybr
1
url VCID-5sfa-s7xw-cyeg
vulnerability_id VCID-5sfa-s7xw-cyeg
summary CFME: default routes expose controllers and actions
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-1317.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1317.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0140.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0140.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0140
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38354
published_at 2026-04-18T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38287
published_at 2026-04-01T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38426
published_at 2026-04-02T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.3845
published_at 2026-04-04T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38313
published_at 2026-04-07T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38364
published_at 2026-04-08T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38372
published_at 2026-04-09T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38389
published_at 2026-04-11T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38352
published_at 2026-04-12T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38327
published_at 2026-04-13T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38375
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0140
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077359
reference_id 1077359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077359
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.1_management_engine:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.1_management_engine:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.1_management_engine:5.2.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.2_management_engine:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.2_management_engine:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.2_management_engine:5.2.2:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.3_management_engine:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.3_management_engine:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.3_management_engine:5.2.3:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.4_management_engine:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.4_management_engine:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.4_management_engine:5.2.4:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.5_management_engine:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.5_management_engine:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.5_management_engine:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0140
reference_id CVE-2014-0140
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-0140
11
reference_url https://access.redhat.com/errata/RHSA-2014:1317
reference_id RHSA-2014:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1317
fixed_packages
aliases CVE-2014-0140
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sfa-s7xw-cyeg
2
url VCID-65ha-wgr4-eqd4
vulnerability_id VCID-65ha-wgr4-eqd4
summary
Reflective XSS Vulnerability
When a translation is missing, the HTML exception message raised does not escape the keys. Under certain common configurations this string can contain user input which would allow an attacker to execute a reflective XSS attack.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html
1
reference_url https://access.redhat.com/errata/RHBA-2015:1100
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2015:1100
2
reference_url https://access.redhat.com/errata/RHSA-2017:0320
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:0320
3
reference_url https://access.redhat.com/errata/RHSA-2018:0380
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0380
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4492.json
5
reference_url https://access.redhat.com/security/cve/CVE-2013-4492
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-4492
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4492
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63446
published_at 2026-04-16T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63453
published_at 2026-04-18T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63447
published_at 2026-04-12T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63463
published_at 2026-04-11T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63323
published_at 2026-04-01T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63384
published_at 2026-04-02T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63411
published_at 2026-04-13T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63376
published_at 2026-04-07T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63428
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4492
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1039435
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1039435
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4492
9
reference_url https://github.com/advisories/GHSA-r5hc-9xx5-97rw
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-r5hc-9xx5-97rw
10
reference_url https://github.com/ruby-i18n/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ruby-i18n/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445
11
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/i18n/CVE-2013-4492.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/i18n/CVE-2013-4492.yml
12
reference_url https://github.com/svenfuchs/i18n
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/i18n
13
reference_url https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445
14
reference_url https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ
reference_id
reference_type
scores
url https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ
15
reference_url https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998
16
reference_url https://web.archive.org/web/20201208125214/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201208125214/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ
17
reference_url https://web.archive.org/web/20210731082547/http://www.securityfocus.com/bid/64076
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210731082547/http://www.securityfocus.com/bid/64076
18
reference_url http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released
19
reference_url http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/
reference_id
reference_type
scores
url http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/
20
reference_url http://www.debian.org/security/2013/dsa-2830
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2013/dsa-2830
21
reference_url http://www.securityfocus.com/bid/64076
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64076
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4492
reference_id CVE-2013-4492
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4492
fixed_packages
aliases CVE-2013-4492, GHSA-r5hc-9xx5-97rw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65ha-wgr4-eqd4
3
url VCID-a8g4-d3m8-uub1
vulnerability_id VCID-a8g4-d3m8-uub1
summary CloudForms: user password stored in recoverable format
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4423.json
1
reference_url https://access.redhat.com/security/cve/cve-2013-4423
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2013-4423
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4423
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28425
published_at 2026-04-18T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28449
published_at 2026-04-16T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-01T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-02T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28611
published_at 2026-04-04T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28414
published_at 2026-04-07T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28481
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28522
published_at 2026-04-09T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-11T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28432
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4423
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4423
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4423
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1018345
reference_id 1018345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1018345
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4423
reference_id CVE-2013-4423
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-4423
fixed_packages
aliases CVE-2013-4423
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a8g4-d3m8-uub1
4
url VCID-e3j5-xgbr-2qa1
vulnerability_id VCID-e3j5-xgbr-2qa1
summary
Possible DoS Vulnerability
A carefully crafted email address in conjunction with the Action Mailer logger format string could take advantage of a bug in Ruby's sprintf implementation and possibly lead to a denial of service attack. Impacted Ruby code will look something like this: `"some string #{user_input}" % some_number`
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4389.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4389.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4389
reference_id
reference_type
scores
0
value 0.01333
scoring_system epss
scoring_elements 0.79991
published_at 2026-04-18T12:55:00Z
1
value 0.01333
scoring_system epss
scoring_elements 0.79921
published_at 2026-04-02T12:55:00Z
2
value 0.01333
scoring_system epss
scoring_elements 0.79942
published_at 2026-04-04T12:55:00Z
3
value 0.01333
scoring_system epss
scoring_elements 0.7993
published_at 2026-04-07T12:55:00Z
4
value 0.01333
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-08T12:55:00Z
5
value 0.01333
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-09T12:55:00Z
6
value 0.01333
scoring_system epss
scoring_elements 0.79988
published_at 2026-04-11T12:55:00Z
7
value 0.01333
scoring_system epss
scoring_elements 0.79971
published_at 2026-04-12T12:55:00Z
8
value 0.01333
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-13T12:55:00Z
9
value 0.01333
scoring_system epss
scoring_elements 0.79914
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4389
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417
10
reference_url http://seclists.org/oss-sec/2013/q4/118
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2013/q4/118
11
reference_url https://github.com/advisories/GHSA-rg5m-3fqp-6px8
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-rg5m-3fqp-6px8
12
reference_url https://github.com/rails/rails/tree/main/actionmailer
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails/tree/main/actionmailer
13
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4389
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4389
15
reference_url https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ
16
reference_url http://www.debian.org/security/2014/dsa-2887
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2887
17
reference_url http://www.debian.org/security/2014/dsa-2888
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2888
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1013913
reference_id 1013913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1013913
fixed_packages
aliases CVE-2013-4389, GHSA-rg5m-3fqp-6px8, OSV-98629
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3j5-xgbr-2qa1
5
url VCID-g4tm-8zhw-a7hn
vulnerability_id VCID-g4tm-8zhw-a7hn
summary Random numbers generated by contrib/pgcrypto functions may be easy for another database user to guessmore details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-1475.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1475.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1900.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1900.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1900
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68504
published_at 2026-04-18T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68388
published_at 2026-04-01T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68408
published_at 2026-04-02T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68428
published_at 2026-04-04T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68404
published_at 2026-04-07T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68455
published_at 2026-04-08T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68471
published_at 2026-04-09T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68497
published_at 2026-04-11T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-12T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68452
published_at 2026-04-13T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.6849
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1900
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
14
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
15
reference_url http://support.apple.com/kb/HT5892
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5892
16
reference_url https://www.postgresql.org/support/security/CVE-2013-1900/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2013-1900/
17
reference_url http://www.debian.org/security/2013/dsa-2657
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2657
18
reference_url http://www.debian.org/security/2013/dsa-2658
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2658
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
21
reference_url http://www.postgresql.org/about/news/1456/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1456/
22
reference_url http://www.postgresql.org/docs/current/static/release-8-4-17.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-8-4-17.html
23
reference_url http://www.postgresql.org/docs/current/static/release-9-0-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-0-13.html
24
reference_url http://www.postgresql.org/docs/current/static/release-9-1-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-9.html
25
reference_url http://www.postgresql.org/docs/current/static/release-9-2-4.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-4.html
26
reference_url http://www.ubuntu.com/usn/USN-1789-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1789-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=929255
reference_id 929255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=929255
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1900
reference_id CVE-2013-1900
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1900
77
reference_url https://security.gentoo.org/glsa/201408-15
reference_id GLSA-201408-15
reference_type
scores
url https://security.gentoo.org/glsa/201408-15
78
reference_url https://access.redhat.com/errata/RHSA-2013:1475
reference_id RHSA-2013:1475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1475
79
reference_url https://usn.ubuntu.com/1789-1/
reference_id USN-1789-1
reference_type
scores
url https://usn.ubuntu.com/1789-1/
fixed_packages
aliases CVE-2013-1900
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4tm-8zhw-a7hn
6
url VCID-g8de-56gr-37cf
vulnerability_id VCID-g8de-56gr-37cf
summary
Arbitrary file existence disclosure
Specially crafted requests can be used to determine whether a file exists on the filesystem that is outside an application's root directory. The files will not be served, but attackers can determine whether the file exists.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html
4
reference_url https://access.redhat.com/errata/RHBA-2015:1100
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2015:1100
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7819.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7819.json
6
reference_url https://access.redhat.com/security/cve/CVE-2014-7819
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-7819
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7819
reference_id
reference_type
scores
0
value 0.00748
scoring_system epss
scoring_elements 0.73153
published_at 2026-04-18T12:55:00Z
1
value 0.00748
scoring_system epss
scoring_elements 0.73052
published_at 2026-04-07T12:55:00Z
2
value 0.00748
scoring_system epss
scoring_elements 0.73089
published_at 2026-04-08T12:55:00Z
3
value 0.00748
scoring_system epss
scoring_elements 0.73102
published_at 2026-04-09T12:55:00Z
4
value 0.00748
scoring_system epss
scoring_elements 0.73127
published_at 2026-04-11T12:55:00Z
5
value 0.00748
scoring_system epss
scoring_elements 0.73106
published_at 2026-04-12T12:55:00Z
6
value 0.00748
scoring_system epss
scoring_elements 0.731
published_at 2026-04-13T12:55:00Z
7
value 0.00748
scoring_system epss
scoring_elements 0.73143
published_at 2026-04-16T12:55:00Z
8
value 0.00748
scoring_system epss
scoring_elements 0.73048
published_at 2026-04-01T12:55:00Z
9
value 0.00748
scoring_system epss
scoring_elements 0.73058
published_at 2026-04-02T12:55:00Z
10
value 0.00748
scoring_system epss
scoring_elements 0.73078
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7819
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1161527
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1161527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7819
10
reference_url https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ
11
reference_url https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ
12
reference_url https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7819
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-7819
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sprockets_project:sprockets:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sprockets_project:sprockets:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:2.6.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:3.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:sprockets_project:sprockets:3.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:3.0.0:beta1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:3.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:sprockets_project:sprockets:3.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sprockets_project:sprockets:3.0.0:beta2:*:*:*:*:*:*
18
reference_url https://github.com/advisories/GHSA-33pp-3763-mrfp
reference_id GHSA-33pp-3763-mrfp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-33pp-3763-mrfp
fixed_packages
aliases CVE-2014-7819, GHSA-33pp-3763-mrfp, OSV-113965
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8de-56gr-37cf
7
url VCID-jggb-58ap-ybab
vulnerability_id VCID-jggb-58ap-ybab
summary
Log Plaintext Password Local Disclosure
REST Client for Ruby contains a flaw that is due to the application logging password information in plaintext. This may allow a local attacker to gain access to password information.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3448.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3448.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3448
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20294
published_at 2026-04-18T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20375
published_at 2026-04-09T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20405
published_at 2026-04-11T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20359
published_at 2026-04-12T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20301
published_at 2026-04-13T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20289
published_at 2026-04-16T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20307
published_at 2026-04-01T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20451
published_at 2026-04-02T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20511
published_at 2026-04-04T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-07T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20317
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3448
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3448
4
reference_url https://github.com/rest-client/rest-client
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rest-client/rest-client
5
reference_url https://github.com/rest-client/rest-client/issues/349
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rest-client/rest-client/issues/349
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3448
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3448
7
reference_url https://web.archive.org/web/20200228154247/http://www.securityfocus.com/bid/74415
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228154247/http://www.securityfocus.com/bid/74415
8
reference_url http://www.osvdb.org/show/osvdb/117461
reference_id
reference_type
scores
url http://www.osvdb.org/show/osvdb/117461
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1240982
reference_id 1240982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1240982
10
reference_url https://github.com/advisories/GHSA-mx9f-w8qq-q5jf
reference_id GHSA-mx9f-w8qq-q5jf
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mx9f-w8qq-q5jf
11
reference_url https://access.redhat.com/errata/RHSA-2021:1313
reference_id RHSA-2021:1313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1313
fixed_packages
aliases CVE-2015-3448, GHSA-mx9f-w8qq-q5jf
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jggb-58ap-ybab
8
url VCID-krve-mwjb-93at
vulnerability_id VCID-krve-mwjb-93at
summary interface: Ruby code injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4172
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.71333
published_at 2026-04-01T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-02T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71359
published_at 2026-04-04T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71332
published_at 2026-04-07T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.71373
published_at 2026-04-08T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71386
published_at 2026-04-09T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71409
published_at 2026-04-11T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71394
published_at 2026-04-12T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71376
published_at 2026-04-13T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.71423
published_at 2026-04-16T12:55:00Z
10
value 0.00673
scoring_system epss
scoring_elements 0.71428
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4172
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=988644
reference_id 988644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=988644
3
reference_url https://access.redhat.com/errata/RHSA-2013:1157
reference_id RHSA-2013:1157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1157
fixed_packages
aliases CVE-2013-4172
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krve-mwjb-93at
9
url VCID-m86x-54rz-2uat
vulnerability_id VCID-m86x-54rz-2uat
summary 2: miq_policy/explorer SQL injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2050.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2050
reference_id
reference_type
scores
0
value 0.54161
scoring_system epss
scoring_elements 0.97999
published_at 2026-04-01T12:55:00Z
1
value 0.54161
scoring_system epss
scoring_elements 0.98004
published_at 2026-04-02T12:55:00Z
2
value 0.54161
scoring_system epss
scoring_elements 0.98006
published_at 2026-04-04T12:55:00Z
3
value 0.54161
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-07T12:55:00Z
4
value 0.54161
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-08T12:55:00Z
5
value 0.54161
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-09T12:55:00Z
6
value 0.54161
scoring_system epss
scoring_elements 0.98018
published_at 2026-04-11T12:55:00Z
7
value 0.54161
scoring_system epss
scoring_elements 0.98019
published_at 2026-04-13T12:55:00Z
8
value 0.54161
scoring_system epss
scoring_elements 0.98026
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2050
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959062
reference_id 959062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959062
fixed_packages
aliases CVE-2013-2050
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m86x-54rz-2uat
10
url VCID-n3ka-63rx-5fgk
vulnerability_id VCID-n3ka-63rx-5fgk
summary A connection request containing a database name that begins with "-" may be crafted to damage or destroy files within a server's data directorymore details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1899.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1899.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1899
reference_id
reference_type
scores
0
value 0.81124
scoring_system epss
scoring_elements 0.99161
published_at 2026-04-18T12:55:00Z
1
value 0.81124
scoring_system epss
scoring_elements 0.99149
published_at 2026-04-01T12:55:00Z
2
value 0.81124
scoring_system epss
scoring_elements 0.99151
published_at 2026-04-02T12:55:00Z
3
value 0.81124
scoring_system epss
scoring_elements 0.99153
published_at 2026-04-04T12:55:00Z
4
value 0.81124
scoring_system epss
scoring_elements 0.99156
published_at 2026-04-07T12:55:00Z
5
value 0.81124
scoring_system epss
scoring_elements 0.99158
published_at 2026-04-13T12:55:00Z
6
value 0.81124
scoring_system epss
scoring_elements 0.99159
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1899
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
13
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
14
reference_url http://support.apple.com/kb/HT5892
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5892
15
reference_url https://www.postgresql.org/support/security/CVE-2013-1899/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2013-1899/
16
reference_url http://www.debian.org/security/2013/dsa-2658
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2658
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
18
reference_url http://www.postgresql.org/about/news/1456/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1456/
19
reference_url http://www.postgresql.org/docs/current/static/release-9-0-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-0-13.html
20
reference_url http://www.postgresql.org/docs/current/static/release-9-1-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-9.html
21
reference_url http://www.postgresql.org/docs/current/static/release-9-2-4.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-4.html
22
reference_url http://www.postgresql.org/support/security/faq/2013-04-04/
reference_id
reference_type
scores
url http://www.postgresql.org/support/security/faq/2013-04-04/
23
reference_url http://www.ubuntu.com/usn/USN-1789-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1789-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=929223
reference_id 929223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=929223
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1899
reference_id CVE-2013-1899
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1899
57
reference_url https://security.gentoo.org/glsa/201408-15
reference_id GLSA-201408-15
reference_type
scores
url https://security.gentoo.org/glsa/201408-15
58
reference_url https://usn.ubuntu.com/1789-1/
reference_id USN-1789-1
reference_type
scores
url https://usn.ubuntu.com/1789-1/
fixed_packages
aliases CVE-2013-1899
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n3ka-63rx-5fgk
11
url VCID-skb5-eeak-v7hz
vulnerability_id VCID-skb5-eeak-v7hz
summary An unprivileged user can run commands that could interfere with in-progress backups.more details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1901.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1901.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1901
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44045
published_at 2026-04-18T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.43971
published_at 2026-04-01T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.4402
published_at 2026-04-02T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44042
published_at 2026-04-04T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.43972
published_at 2026-04-07T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44023
published_at 2026-04-08T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44025
published_at 2026-04-09T12:55:00Z
7
value 0.00215
scoring_system epss
scoring_elements 0.4404
published_at 2026-04-11T12:55:00Z
8
value 0.00215
scoring_system epss
scoring_elements 0.44008
published_at 2026-04-12T12:55:00Z
9
value 0.00215
scoring_system epss
scoring_elements 0.43992
published_at 2026-04-13T12:55:00Z
10
value 0.00215
scoring_system epss
scoring_elements 0.44054
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1901
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
13
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
14
reference_url http://support.apple.com/kb/HT5892
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5892
15
reference_url https://www.postgresql.org/support/security/CVE-2013-1901/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2013-1901/
16
reference_url http://www.debian.org/security/2013/dsa-2658
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2658
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
18
reference_url http://www.postgresql.org/about/news/1456/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1456/
19
reference_url http://www.postgresql.org/docs/current/static/release-9-1-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-9.html
20
reference_url http://www.postgresql.org/docs/current/static/release-9-2-4.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-4.html
21
reference_url http://www.ubuntu.com/usn/USN-1789-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1789-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=929328
reference_id 929328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=929328
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1901
reference_id CVE-2013-1901
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1901
42
reference_url https://security.gentoo.org/glsa/201408-15
reference_id GLSA-201408-15
reference_type
scores
url https://security.gentoo.org/glsa/201408-15
43
reference_url https://usn.ubuntu.com/1789-1/
reference_id USN-1789-1
reference_type
scores
url https://usn.ubuntu.com/1789-1/
fixed_packages
aliases CVE-2013-1901
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skb5-eeak-v7hz
12
url VCID-ueq8-4dv4-eubu
vulnerability_id VCID-ueq8-4dv4-eubu
summary 2: static secret_token.rb value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2049.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2049
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36873
published_at 2026-04-18T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.3689
published_at 2026-04-16T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36811
published_at 2026-04-01T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36965
published_at 2026-04-02T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36999
published_at 2026-04-04T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.3683
published_at 2026-04-07T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36881
published_at 2026-04-08T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36897
published_at 2026-04-09T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36905
published_at 2026-04-11T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36869
published_at 2026-04-12T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36844
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2049
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959041
reference_id 959041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959041
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_management_engine:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_management_engine:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_management_engine:2.0:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2049
reference_id CVE-2013-2049
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2049
fixed_packages
aliases CVE-2013-2049
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ueq8-4dv4-eubu
13
url VCID-vhdm-w6p1-uuh9
vulnerability_id VCID-vhdm-w6p1-uuh9
summary
Session fixation vulnerability via Set-Cookie headers
The package rest-client in `abstract_response.rb` improperly handles `Set-Cookie` headers on HTTP redirection responses. Any cookies will be forwarded to the redirection target regardless of domain, path, or expiration. If you control a redirection source, you can cause rest-client to perform a request to any third-party domain with cookies of your choosing, which may be useful in performing a session fixation attack. If you control a redirection target, you can steal any cookies set by the third-party redirection request.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1820.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1820
reference_id
reference_type
scores
0
value 0.03723
scoring_system epss
scoring_elements 0.87939
published_at 2026-04-02T12:55:00Z
1
value 0.03723
scoring_system epss
scoring_elements 0.87999
published_at 2026-04-18T12:55:00Z
2
value 0.03723
scoring_system epss
scoring_elements 0.88001
published_at 2026-04-16T12:55:00Z
3
value 0.03723
scoring_system epss
scoring_elements 0.87987
published_at 2026-04-13T12:55:00Z
4
value 0.03723
scoring_system epss
scoring_elements 0.87995
published_at 2026-04-11T12:55:00Z
5
value 0.03723
scoring_system epss
scoring_elements 0.87984
published_at 2026-04-09T12:55:00Z
6
value 0.03723
scoring_system epss
scoring_elements 0.87977
published_at 2026-04-08T12:55:00Z
7
value 0.03723
scoring_system epss
scoring_elements 0.87956
published_at 2026-04-07T12:55:00Z
8
value 0.03723
scoring_system epss
scoring_elements 0.87929
published_at 2026-04-01T12:55:00Z
9
value 0.03723
scoring_system epss
scoring_elements 0.87952
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1820
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1205291
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1205291
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1820
4
reference_url https://github.com/rest-client/rest-client
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rest-client/rest-client
5
reference_url https://github.com/rest-client/rest-client/issues/369
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rest-client/rest-client/issues/369
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1820
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-1820
7
reference_url https://rubygems.org/gems/rest-client/versions/1.6.1.a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rubygems.org/gems/rest-client/versions/1.6.1.a
8
reference_url https://web.archive.org/web/20200228080106/http://www.securityfocus.com/bid/73295
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228080106/http://www.securityfocus.com/bid/73295
9
reference_url http://www.openwall.com/lists/oss-security/2015/03/24/3
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2015/03/24/3
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781238
reference_id 781238
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781238
11
reference_url https://github.com/advisories/GHSA-3fhf-6939-qg8p
reference_id GHSA-3fhf-6939-qg8p
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3fhf-6939-qg8p
12
reference_url https://access.redhat.com/errata/RHSA-2021:1313
reference_id RHSA-2021:1313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1313
fixed_packages
aliases CVE-2015-1820, GHSA-3fhf-6939-qg8p, OSV-119878
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhdm-w6p1-uuh9
14
url VCID-wyku-upny-vuhk
vulnerability_id VCID-wyku-upny-vuhk
summary CFME: dangerous send method in performance.rb
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-1317.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1317.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3642.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3642.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3642
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59764
published_at 2026-04-18T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59602
published_at 2026-04-01T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59676
published_at 2026-04-02T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59701
published_at 2026-04-04T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59671
published_at 2026-04-07T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59722
published_at 2026-04-08T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59735
published_at 2026-04-09T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59754
published_at 2026-04-11T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59738
published_at 2026-04-12T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.5972
published_at 2026-04-13T12:55:00Z
10
value 0.00385
scoring_system epss
scoring_elements 0.59757
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3642
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1092894
reference_id 1092894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1092894
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.1_management_engine:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.1_management_engine:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.1_management_engine:5.2.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.2_management_engine:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.2_management_engine:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.2_management_engine:5.2.2:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.3_management_engine:5.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.3_management_engine:5.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.3_management_engine:5.2.3:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.4_management_engine:5.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.4_management_engine:5.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.4_management_engine:5.2.4:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.5_management_engine:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0.5_management_engine:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0.5_management_engine:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3642
reference_id CVE-2014-3642
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3642
11
reference_url https://access.redhat.com/errata/RHSA-2014:1317
reference_id RHSA-2014:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1317
fixed_packages
aliases CVE-2014-3642
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyku-upny-vuhk
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libdnet@1.12-11%3Farch=el6cf