| 0 |
| url |
VCID-3xkv-ckqz-r3dx |
| vulnerability_id |
VCID-3xkv-ckqz-r3dx |
| summary |
Improper Input Validation
The Mail gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87915 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87901 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.8787 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87913 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87914 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.8791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87898 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87844 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.03667 |
| scoring_system |
epss |
| scoring_elements |
0.87854 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2140 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2140, GHSA-rp63-jfmw-532w, OSV-81632
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3xkv-ckqz-r3dx |
|
| 1 |
| url |
VCID-67r2-k4bt-yqcr |
| vulnerability_id |
VCID-67r2-k4bt-yqcr |
| summary |
Katello: /etc/katello/secure/passphrase is world readable |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5561 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29086 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.2918 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29256 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29306 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29119 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29184 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29224 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29131 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29134 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5561 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5561
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67r2-k4bt-yqcr |
|
| 2 |
| url |
VCID-75gs-2gu3-6udx |
| vulnerability_id |
VCID-75gs-2gu3-6udx |
| summary |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.7874 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78679 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78737 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78705 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78712 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78734 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01176 |
| scoring_system |
epss |
| scoring_elements |
0.78738 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0215 |
| scoring_system |
epss |
| scoring_elements |
0.84187 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0215 |
| scoring_system |
epss |
| scoring_elements |
0.84205 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.0215 |
| scoring_system |
epss |
| scoring_elements |
0.84174 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3865 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3865, GHSA-g89m-3wjw-h857
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-75gs-2gu3-6udx |
|
| 3 |
| url |
VCID-91xe-ev7t-akb9 |
| vulnerability_id |
VCID-91xe-ev7t-akb9 |
| summary |
Uncontrolled Resource Consumption
lib/rack/multipart.rb in Rack uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6109 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74542 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.7445 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74454 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.7448 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74455 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74503 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74524 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74506 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74497 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00828 |
| scoring_system |
epss |
| scoring_elements |
0.74535 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6109 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6109, GHSA-h77x-m5q8-c29h, OSV-89317
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-91xe-ev7t-akb9 |
|
| 4 |
| url |
VCID-9uh8-upzm-7bgd |
| vulnerability_id |
VCID-9uh8-upzm-7bgd |
| summary |
Uncontrolled Resource Consumption
Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.7153 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.715 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71535 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71519 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71501 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71547 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71552 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71463 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.7147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.71487 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00677 |
| scoring_system |
epss |
| scoring_elements |
0.7146 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0184 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0184, GHSA-v882-ccj6-jc48, OSV-89327
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9uh8-upzm-7bgd |
|
| 5 |
| url |
VCID-awt1-8bxs-xffs |
| vulnerability_id |
VCID-awt1-8bxs-xffs |
| summary |
actionpack Improper Authentication vulnerability
The `decode_credentials` method in `actionpack/lib/action_controller/metal/http_authentication.rb` in Ruby on Rails before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a `with_http_digest` helper method, as demonstrated by the `authenticate_or_request_with_http_digest` method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3424 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.7676 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76771 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76799 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76818 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76714 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76718 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76746 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76729 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3424 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3424, GHSA-92w9-2pqw-rhjj, OSV-84243
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-awt1-8bxs-xffs |
|
| 6 |
| url |
VCID-bsxw-gh14-rbef |
| vulnerability_id |
VCID-bsxw-gh14-rbef |
| summary |
activerecord vulnerable to SQL Injection
The Active Record component in Ruby on Rails efore 2.3.15, 3.0.x before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70503 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70462 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70478 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70502 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70487 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70473 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70515 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70523 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70408 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00637 |
| scoring_system |
epss |
| scoring_elements |
0.70417 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2695 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2695, GHSA-76wq-xw4h-f8wj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bsxw-gh14-rbef |
|
| 7 |
| url |
VCID-c1w4-z275-tqg7 |
| vulnerability_id |
VCID-c1w4-z275-tqg7 |
| summary |
Ruby on Rails Potential XSS Vulnerability in select_tag prompt
When a value for the `prompt` field is supplied to the `select_tag` helper, the value is not escaped. If untrusted data is not escaped, and is supplied as the prompt value, there is a potential for XSS attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3463 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56143 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56166 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56177 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56171 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56174 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56001 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56161 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3463 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3463, GHSA-98mf-8f57-64qf, OSV-84515
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c1w4-z275-tqg7 |
|
| 8 |
| url |
VCID-cwa7-9d2t-rfhb |
| vulnerability_id |
VCID-cwa7-9d2t-rfhb |
| summary |
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/sanitize_helper.rb` in the `strip_tags` helper in Ruby on Rails before 2.3.16, 3.0.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3465 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56143 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56161 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56166 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56177 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56171 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56174 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56001 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5613 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3465 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3465, GHSA-7g65-ghrg-hpf5, OSV-84513
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cwa7-9d2t-rfhb |
|
| 9 |
| url |
VCID-h88b-abes-3bgr |
| vulnerability_id |
VCID-h88b-abes-3bgr |
| summary |
Puppet Denial of Service and Arbitrary File Write
Unspecified vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1987 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73445 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73351 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.7336 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73384 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73392 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73429 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73401 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00763 |
| scoring_system |
epss |
| scoring_elements |
0.73451 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1987 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1987, GHSA-v58w-6xc2-w799
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h88b-abes-3bgr |
|
| 10 |
| url |
VCID-hr2h-y693-sbgc |
| vulnerability_id |
VCID-hr2h-y693-sbgc |
| summary |
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.rb` in Ruby on Rails before 2.3.16, 3.0.x before , 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3464 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56143 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56174 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56171 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56177 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56166 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56161 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56001 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5611 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3464 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3464, GHSA-h835-75hw-pj89, OSV-84516
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hr2h-y693-sbgc |
|
| 11 |
| url |
VCID-kt2h-k72f-tqc7 |
| vulnerability_id |
VCID-kt2h-k72f-tqc7 |
| summary |
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1988 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65684 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65568 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65616 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65646 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65612 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65664 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65676 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65696 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65682 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65653 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65688 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65701 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1988 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1988, GHSA-6xxq-j39w-g3f6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kt2h-k72f-tqc7 |
|
| 12 |
| url |
VCID-phxs-zet8-ryh3 |
| vulnerability_id |
VCID-phxs-zet8-ryh3 |
| summary |
SQL Injection
Ruby on Rails contains a flaw related to the way ActiveRecord handles parameters in conjunction with the way Rack parses query parameters. This issue may allow an attacker to inject arbitrary `IS NULL` clauses in to application SQL queries. This may also allow an attacker to have the SQL query check for `NULL` in arbitrary places. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52796 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52745 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52663 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52751 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.527 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52792 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52808 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52801 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52763 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5278 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2660 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2660, GHSA-hgpp-pp89-4fgf, OSV-82610
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-phxs-zet8-ryh3 |
|
| 13 |
| url |
VCID-rq7w-zmh4-17e1 |
| vulnerability_id |
VCID-rq7w-zmh4-17e1 |
| summary |
SQL injection vulnerability in Active Record
Due to the way Active Record handles nested query parameters, an attacker can use a specially crafted request to inject some forms of SQL into your application's SQL queries. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72697 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72652 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72604 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72611 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72628 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72605 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72656 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72679 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72662 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2661 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2661, GHSA-fh39-v733-mxfr, OSV-82403
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rq7w-zmh4-17e1 |
|
| 14 |
| url |
VCID-rrky-upea-nfd4 |
| vulnerability_id |
VCID-rrky-upea-nfd4 |
| summary |
puppet: authenticated clients allowed to read arbitrary files from the puppet master |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54466 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54542 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54565 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54534 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54586 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54592 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54574 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5459 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54569 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3864 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3864
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rrky-upea-nfd4 |
|
| 15 |
| url |
VCID-teq8-nqhf-xbbq |
| vulnerability_id |
VCID-teq8-nqhf-xbbq |
| summary |
Improper Restriction of Operations within the Bounds of a Memory Buffer
multipart/parser.rb in Rack allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82924 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82816 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82846 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82842 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82868 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82874 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.8289 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82885 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82881 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.8292 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01824 |
| scoring_system |
epss |
| scoring_elements |
0.82921 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0183 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0183, GHSA-3pxh-h8hw-mj8w, OSV-89320
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-teq8-nqhf-xbbq |
|
| 16 |
| url |
VCID-tt6r-bytq-4fa4 |
| vulnerability_id |
VCID-tt6r-bytq-4fa4 |
| summary |
actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2694 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44673 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44693 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44682 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4465 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4472 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44728 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4467 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2694 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2694, GHSA-q34c-48gc-m9g8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tt6r-bytq-4fa4 |
|
| 17 |
| url |
VCID-vspr-h3ds-dudq |
| vulnerability_id |
VCID-vspr-h3ds-dudq |
| summary |
Incorrect temporary file usage
The ruby_parser Gem does not create temporary files securely. In the `diff_pp` function contained in `lib/gauntlet_rubyparser.rb` function, it creates files as `/tmp/a.[pid]` and `/tmp/b.[pid]` which can be predicted and used for either a denial of service (file cannot be overwritten), or to change the contents of files that are writable. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35374 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35386 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35432 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35457 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35465 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35423 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35399 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35439 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35427 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35279 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35478 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35503 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0162 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0162, GHSA-8mvw-22r7-w6fq, OSV-90561
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vspr-h3ds-dudq |
|
| 18 |
| url |
VCID-wage-71h9-6qay |
| vulnerability_id |
VCID-wage-71h9-6qay |
| summary |
Moderate severity vulnerability that affects puppet
lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3867 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80599 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80571 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80578 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80544 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80604 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80536 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80592 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80516 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.01418 |
| scoring_system |
epss |
| scoring_elements |
0.80522 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3867 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3867, GHSA-q44r-f2hm-v76v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wage-71h9-6qay |
|
| 19 |
| url |
VCID-y93x-twrw-bfbf |
| vulnerability_id |
VCID-y93x-twrw-bfbf |
| summary |
Katello: lack of authorization in proxies_controller.rb |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5603 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.4867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48555 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48596 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.4862 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48572 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48626 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48621 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48639 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48612 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48625 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48674 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5603 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5603
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y93x-twrw-bfbf |
|
| 20 |
| url |
VCID-yycs-ny3v-pyeh |
| vulnerability_id |
VCID-yycs-ny3v-pyeh |
| summary |
Multiple vulnerabilities have been found in Puppet, the worst of
which could lead to execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1986 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.58974 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59049 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59071 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59036 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59087 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59093 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59111 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59075 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.5911 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59115 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59095 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1986 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1986
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yycs-ny3v-pyeh |
|
| 21 |
| url |
VCID-z8cv-3uer-pqbm |
| vulnerability_id |
VCID-z8cv-3uer-pqbm |
| summary |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2139 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87666 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87622 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87624 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.8765 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87661 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87656 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87653 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87669 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87598 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.03527 |
| scoring_system |
epss |
| scoring_elements |
0.87608 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2139 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2139, GHSA-cj92-c4fj-w9c5, OSV-81631
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z8cv-3uer-pqbm |
|