Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/ruby193-rubygem-treetop@1.4.10-6?arch=el6
Typerpm
Namespaceredhat
Nameruby193-rubygem-treetop
Version1.4.10-6
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-23ur-7nqb-tybr
vulnerability_id VCID-23ur-7nqb-tybr
summary EVM: CSRF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0185.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0185
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27009
published_at 2026-04-21T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27047
published_at 2026-04-18T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27175
published_at 2026-04-01T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27215
published_at 2026-04-02T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27253
published_at 2026-04-04T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27046
published_at 2026-04-07T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27115
published_at 2026-04-08T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27161
published_at 2026-04-09T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27167
published_at 2026-04-11T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27123
published_at 2026-04-12T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27065
published_at 2026-04-13T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27074
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0185
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=895345
reference_id 895345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=895345
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:manageiq_enterprise_virtualization_manager:-:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0185
reference_id CVE-2013-0185
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2013-0185
fixed_packages
aliases CVE-2013-0185
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23ur-7nqb-tybr
1
url VCID-455w-hqsj-jkh1
vulnerability_id VCID-455w-hqsj-jkh1
summary OpenShift Enterprise and Online vulnerable to CSRF attack with REST API
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0196.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0196
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.2935
published_at 2026-04-01T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29419
published_at 2026-04-02T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29466
published_at 2026-04-04T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29279
published_at 2026-04-07T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29343
published_at 2026-04-12T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29384
published_at 2026-04-09T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29388
published_at 2026-04-11T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.2929
published_at 2026-04-18T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29315
published_at 2026-04-16T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29246
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0196
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=901364
reference_id 901364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=901364
fixed_packages
aliases CVE-2013-0196
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-455w-hqsj-jkh1
2
url VCID-a8g4-d3m8-uub1
vulnerability_id VCID-a8g4-d3m8-uub1
summary CloudForms: user password stored in recoverable format
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4423.json
1
reference_url https://access.redhat.com/security/cve/cve-2013-4423
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2013-4423
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4423
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28373
published_at 2026-04-21T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28425
published_at 2026-04-18T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-01T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-02T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28611
published_at 2026-04-04T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28414
published_at 2026-04-07T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28481
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28522
published_at 2026-04-09T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-11T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28432
published_at 2026-04-13T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28449
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4423
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4423
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4423
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1018345
reference_id 1018345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1018345
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4423
reference_id CVE-2013-4423
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-4423
fixed_packages
aliases CVE-2013-4423
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a8g4-d3m8-uub1
3
url VCID-g4tm-8zhw-a7hn
vulnerability_id VCID-g4tm-8zhw-a7hn
summary Random numbers generated by contrib/pgcrypto functions may be easy for another database user to guessmore details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-1475.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1475.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1900.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1900.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1900
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68482
published_at 2026-04-21T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68388
published_at 2026-04-01T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68408
published_at 2026-04-02T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.68428
published_at 2026-04-04T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68404
published_at 2026-04-07T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68455
published_at 2026-04-08T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68471
published_at 2026-04-09T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68497
published_at 2026-04-11T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-12T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68452
published_at 2026-04-13T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.6849
published_at 2026-04-16T12:55:00Z
11
value 0.00566
scoring_system epss
scoring_elements 0.68504
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1900
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
14
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
15
reference_url http://support.apple.com/kb/HT5892
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5892
16
reference_url https://www.postgresql.org/support/security/CVE-2013-1900/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2013-1900/
17
reference_url http://www.debian.org/security/2013/dsa-2657
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2657
18
reference_url http://www.debian.org/security/2013/dsa-2658
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2658
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
20
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
21
reference_url http://www.postgresql.org/about/news/1456/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1456/
22
reference_url http://www.postgresql.org/docs/current/static/release-8-4-17.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-8-4-17.html
23
reference_url http://www.postgresql.org/docs/current/static/release-9-0-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-0-13.html
24
reference_url http://www.postgresql.org/docs/current/static/release-9-1-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-9.html
25
reference_url http://www.postgresql.org/docs/current/static/release-9-2-4.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-4.html
26
reference_url http://www.ubuntu.com/usn/USN-1789-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1789-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=929255
reference_id 929255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=929255
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1900
reference_id CVE-2013-1900
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1900
77
reference_url https://security.gentoo.org/glsa/201408-15
reference_id GLSA-201408-15
reference_type
scores
url https://security.gentoo.org/glsa/201408-15
78
reference_url https://access.redhat.com/errata/RHSA-2013:1475
reference_id RHSA-2013:1475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1475
79
reference_url https://usn.ubuntu.com/1789-1/
reference_id USN-1789-1
reference_type
scores
url https://usn.ubuntu.com/1789-1/
fixed_packages
aliases CVE-2013-1900
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4tm-8zhw-a7hn
4
url VCID-krve-mwjb-93at
vulnerability_id VCID-krve-mwjb-93at
summary interface: Ruby code injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4172.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4172
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.71333
published_at 2026-04-01T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-02T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71359
published_at 2026-04-04T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71332
published_at 2026-04-07T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.71373
published_at 2026-04-08T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71386
published_at 2026-04-09T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71409
published_at 2026-04-11T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71394
published_at 2026-04-12T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71376
published_at 2026-04-13T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.71423
published_at 2026-04-16T12:55:00Z
10
value 0.00673
scoring_system epss
scoring_elements 0.71428
published_at 2026-04-18T12:55:00Z
11
value 0.00673
scoring_system epss
scoring_elements 0.71408
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4172
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=988644
reference_id 988644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=988644
3
reference_url https://access.redhat.com/errata/RHSA-2013:1157
reference_id RHSA-2013:1157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1157
fixed_packages
aliases CVE-2013-4172
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krve-mwjb-93at
5
url VCID-m86x-54rz-2uat
vulnerability_id VCID-m86x-54rz-2uat
summary 2: miq_policy/explorer SQL injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2050.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2050
reference_id
reference_type
scores
0
value 0.54161
scoring_system epss
scoring_elements 0.97999
published_at 2026-04-01T12:55:00Z
1
value 0.54161
scoring_system epss
scoring_elements 0.98004
published_at 2026-04-02T12:55:00Z
2
value 0.54161
scoring_system epss
scoring_elements 0.98006
published_at 2026-04-04T12:55:00Z
3
value 0.54161
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-07T12:55:00Z
4
value 0.54161
scoring_system epss
scoring_elements 0.98012
published_at 2026-04-08T12:55:00Z
5
value 0.54161
scoring_system epss
scoring_elements 0.98014
published_at 2026-04-09T12:55:00Z
6
value 0.54161
scoring_system epss
scoring_elements 0.98018
published_at 2026-04-11T12:55:00Z
7
value 0.54161
scoring_system epss
scoring_elements 0.98019
published_at 2026-04-13T12:55:00Z
8
value 0.54161
scoring_system epss
scoring_elements 0.98026
published_at 2026-04-18T12:55:00Z
9
value 0.54161
scoring_system epss
scoring_elements 0.98024
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2050
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959062
reference_id 959062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959062
fixed_packages
aliases CVE-2013-2050
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m86x-54rz-2uat
6
url VCID-n3ka-63rx-5fgk
vulnerability_id VCID-n3ka-63rx-5fgk
summary A connection request containing a database name that begins with "-" may be crafted to damage or destroy files within a server's data directorymore details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1899.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1899.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1899
reference_id
reference_type
scores
0
value 0.81124
scoring_system epss
scoring_elements 0.99161
published_at 2026-04-21T12:55:00Z
1
value 0.81124
scoring_system epss
scoring_elements 0.99149
published_at 2026-04-01T12:55:00Z
2
value 0.81124
scoring_system epss
scoring_elements 0.99151
published_at 2026-04-02T12:55:00Z
3
value 0.81124
scoring_system epss
scoring_elements 0.99153
published_at 2026-04-04T12:55:00Z
4
value 0.81124
scoring_system epss
scoring_elements 0.99156
published_at 2026-04-07T12:55:00Z
5
value 0.81124
scoring_system epss
scoring_elements 0.99158
published_at 2026-04-13T12:55:00Z
6
value 0.81124
scoring_system epss
scoring_elements 0.99159
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1899
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
13
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
14
reference_url http://support.apple.com/kb/HT5892
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5892
15
reference_url https://www.postgresql.org/support/security/CVE-2013-1899/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2013-1899/
16
reference_url http://www.debian.org/security/2013/dsa-2658
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2658
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
18
reference_url http://www.postgresql.org/about/news/1456/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1456/
19
reference_url http://www.postgresql.org/docs/current/static/release-9-0-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-0-13.html
20
reference_url http://www.postgresql.org/docs/current/static/release-9-1-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-9.html
21
reference_url http://www.postgresql.org/docs/current/static/release-9-2-4.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-4.html
22
reference_url http://www.postgresql.org/support/security/faq/2013-04-04/
reference_id
reference_type
scores
url http://www.postgresql.org/support/security/faq/2013-04-04/
23
reference_url http://www.ubuntu.com/usn/USN-1789-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1789-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=929223
reference_id 929223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=929223
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1899
reference_id CVE-2013-1899
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1899
57
reference_url https://security.gentoo.org/glsa/201408-15
reference_id GLSA-201408-15
reference_type
scores
url https://security.gentoo.org/glsa/201408-15
58
reference_url https://usn.ubuntu.com/1789-1/
reference_id USN-1789-1
reference_type
scores
url https://usn.ubuntu.com/1789-1/
fixed_packages
aliases CVE-2013-1899
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n3ka-63rx-5fgk
7
url VCID-pb4n-q6u8-syds
vulnerability_id VCID-pb4n-q6u8-syds
summary
XSS exploit of RDoc documentation generated by rdoc
This exploit may lead to cookie disclosure to third parties. The exploit exists in darkfish.js which is copied from the RDoc install location to the generated documentation. RDoc is a static documentation generation tool. Patching the library itself is insufficient to correct this exploit.
references
0
reference_url http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
reference_id
reference_type
scores
url http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0548.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0548.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0686.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0686.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0701.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0701.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0728.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0728.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0256.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0256.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0256
reference_id
reference_type
scores
0
value 0.03584
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-21T12:55:00Z
1
value 0.03584
scoring_system epss
scoring_elements 0.87692
published_at 2026-04-01T12:55:00Z
2
value 0.03584
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-02T12:55:00Z
3
value 0.03584
scoring_system epss
scoring_elements 0.87714
published_at 2026-04-04T12:55:00Z
4
value 0.03584
scoring_system epss
scoring_elements 0.87716
published_at 2026-04-07T12:55:00Z
5
value 0.03584
scoring_system epss
scoring_elements 0.87738
published_at 2026-04-08T12:55:00Z
6
value 0.03584
scoring_system epss
scoring_elements 0.87744
published_at 2026-04-09T12:55:00Z
7
value 0.03584
scoring_system epss
scoring_elements 0.87755
published_at 2026-04-11T12:55:00Z
8
value 0.03584
scoring_system epss
scoring_elements 0.87749
published_at 2026-04-12T12:55:00Z
9
value 0.03584
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-13T12:55:00Z
10
value 0.03584
scoring_system epss
scoring_elements 0.87761
published_at 2026-04-16T12:55:00Z
11
value 0.03584
scoring_system epss
scoring_elements 0.8776
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0256
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=907820
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=907820
10
reference_url http://secunia.com/advisories/52774
reference_id
reference_type
scores
url http://secunia.com/advisories/52774
11
reference_url https://github.com/advisories/GHSA-v2r9-c84j-v7xm
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-v2r9-c84j-v7xm
12
reference_url https://github.com/rdoc/rdoc
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rdoc/rdoc
13
reference_url https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
14
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0256
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-0256
16
reference_url https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
17
reference_url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256
18
reference_url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
19
reference_url http://www.ubuntu.com/usn/USN-1733-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1733-1
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
reference_id cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
37
reference_url https://github.com/rdoc/rdoc/blob/master/CVE-2013-0256.rdoc
reference_id CVE-2013-0256.RDOC
reference_type
scores
url https://github.com/rdoc/rdoc/blob/master/CVE-2013-0256.rdoc
38
reference_url https://access.redhat.com/errata/RHSA-2013:0686
reference_id RHSA-2013:0686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0686
39
reference_url https://access.redhat.com/errata/RHSA-2013:0701
reference_id RHSA-2013:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0701
40
reference_url https://access.redhat.com/errata/RHSA-2013:0728
reference_id RHSA-2013:0728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0728
41
reference_url https://usn.ubuntu.com/1733-1/
reference_id USN-1733-1
reference_type
scores
url https://usn.ubuntu.com/1733-1/
fixed_packages
aliases CVE-2013-0256, GHSA-v2r9-c84j-v7xm, OSV-90004
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pb4n-q6u8-syds
8
url VCID-skb5-eeak-v7hz
vulnerability_id VCID-skb5-eeak-v7hz
summary An unprivileged user can run commands that could interfere with in-progress backups.more details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1901.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1901.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1901
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.43979
published_at 2026-04-21T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.43971
published_at 2026-04-01T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.4402
published_at 2026-04-02T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44042
published_at 2026-04-04T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.43972
published_at 2026-04-07T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44023
published_at 2026-04-08T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44025
published_at 2026-04-09T12:55:00Z
7
value 0.00215
scoring_system epss
scoring_elements 0.4404
published_at 2026-04-11T12:55:00Z
8
value 0.00215
scoring_system epss
scoring_elements 0.44008
published_at 2026-04-12T12:55:00Z
9
value 0.00215
scoring_system epss
scoring_elements 0.43992
published_at 2026-04-13T12:55:00Z
10
value 0.00215
scoring_system epss
scoring_elements 0.44054
published_at 2026-04-16T12:55:00Z
11
value 0.00215
scoring_system epss
scoring_elements 0.44045
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1901
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901
13
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
14
reference_url http://support.apple.com/kb/HT5892
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5892
15
reference_url https://www.postgresql.org/support/security/CVE-2013-1901/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2013-1901/
16
reference_url http://www.debian.org/security/2013/dsa-2658
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2658
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:142
18
reference_url http://www.postgresql.org/about/news/1456/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1456/
19
reference_url http://www.postgresql.org/docs/current/static/release-9-1-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-9.html
20
reference_url http://www.postgresql.org/docs/current/static/release-9-2-4.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-4.html
21
reference_url http://www.ubuntu.com/usn/USN-1789-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1789-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=929328
reference_id 929328
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=929328
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1901
reference_id CVE-2013-1901
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1901
42
reference_url https://security.gentoo.org/glsa/201408-15
reference_id GLSA-201408-15
reference_type
scores
url https://security.gentoo.org/glsa/201408-15
43
reference_url https://usn.ubuntu.com/1789-1/
reference_id USN-1789-1
reference_type
scores
url https://usn.ubuntu.com/1789-1/
fixed_packages
aliases CVE-2013-1901
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skb5-eeak-v7hz
9
url VCID-ueq8-4dv4-eubu
vulnerability_id VCID-ueq8-4dv4-eubu
summary 2: static secret_token.rb value
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2049.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2049
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36815
published_at 2026-04-21T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36873
published_at 2026-04-18T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36811
published_at 2026-04-01T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36965
published_at 2026-04-02T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36999
published_at 2026-04-04T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.3683
published_at 2026-04-07T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36881
published_at 2026-04-08T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36897
published_at 2026-04-09T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36905
published_at 2026-04-11T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36869
published_at 2026-04-12T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36844
published_at 2026-04-13T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.3689
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2049
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959041
reference_id 959041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959041
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_management_engine:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:cloudforms_management_engine:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_management_engine:2.0:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2049
reference_id CVE-2013-2049
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2049
fixed_packages
aliases CVE-2013-2049
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ueq8-4dv4-eubu
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby193-rubygem-treetop@1.4.10-6%3Farch=el6