Lookup for vulnerable packages by Package URL.

Purlpkg:gem/rack@1.5
Typegem
Namespace
Namerack
Version1.5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.2.22
Latest_non_vulnerable_version3.2.6
Affected_by_vulnerabilities
0
url VCID-35e6-cpn8-w7h1
vulnerability_id VCID-35e6-cpn8-w7h1
summary
Symlink path traversal in Rack::File
Affected versions allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
1
reference_url http://rack.github.com/
reference_id
reference_type
scores
url http://rack.github.com/
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0262.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0262.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0262
reference_id
reference_type
scores
0
value 0.01256
scoring_system epss
scoring_elements 0.79407
published_at 2026-04-18T12:55:00Z
1
value 0.01256
scoring_system epss
scoring_elements 0.79409
published_at 2026-04-16T12:55:00Z
2
value 0.01256
scoring_system epss
scoring_elements 0.79377
published_at 2026-04-13T12:55:00Z
3
value 0.01256
scoring_system epss
scoring_elements 0.79388
published_at 2026-04-12T12:55:00Z
4
value 0.01256
scoring_system epss
scoring_elements 0.79403
published_at 2026-04-11T12:55:00Z
5
value 0.01256
scoring_system epss
scoring_elements 0.7938
published_at 2026-04-09T12:55:00Z
6
value 0.01256
scoring_system epss
scoring_elements 0.79371
published_at 2026-04-08T12:55:00Z
7
value 0.01256
scoring_system epss
scoring_elements 0.79345
published_at 2026-04-07T12:55:00Z
8
value 0.01256
scoring_system epss
scoring_elements 0.79359
published_at 2026-04-04T12:55:00Z
9
value 0.01256
scoring_system epss
scoring_elements 0.79329
published_at 2026-04-01T12:55:00Z
10
value 0.01256
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-02T12:55:00Z
11
value 0.01263
scoring_system epss
scoring_elements 0.79472
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0262
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=909071
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=909071
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=909072
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=909072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0262
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0262
7
reference_url http://secunia.com/advisories/52033
reference_id
reference_type
scores
url http://secunia.com/advisories/52033
8
reference_url https://gist.github.com/rentzsch/4736940
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://gist.github.com/rentzsch/4736940
9
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
10
reference_url https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56
11
reference_url https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30
12
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0262.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0262.yml
13
reference_url https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
14
reference_url https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
15
reference_url https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
16
reference_url https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0262
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-0262
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700173
reference_id 700173
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700173
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*
26
reference_url https://github.com/advisories/GHSA-85r7-w5mv-c849
reference_id GHSA-85r7-w5mv-c849
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-85r7-w5mv-c849
27
reference_url https://security.gentoo.org/glsa/201405-10
reference_id GLSA-201405-10
reference_type
scores
url https://security.gentoo.org/glsa/201405-10
fixed_packages
0
url pkg:gem/rack@1.5.2
purl pkg:gem/rack@1.5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3ycr-9smk-uqdc
1
vulnerability VCID-47ja-djzb-2bbw
2
vulnerability VCID-6c1k-vgv4-93ad
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-9rpp-9xss-duf6
8
vulnerability VCID-arac-j5h5-zkcu
9
vulnerability VCID-azu5-jcmd-3ufx
10
vulnerability VCID-c21j-snf1-d3cb
11
vulnerability VCID-c5sc-7qnn-mkb9
12
vulnerability VCID-d58r-22kr-9bct
13
vulnerability VCID-fpg2-nhey-rkcc
14
vulnerability VCID-gdhf-e8q1-kbat
15
vulnerability VCID-gtzk-m9rm-57hw
16
vulnerability VCID-jxws-ws21-4uaa
17
vulnerability VCID-npag-sz7d-v7b6
18
vulnerability VCID-qt1u-2p37-xfet
19
vulnerability VCID-s971-gkdg-jkhc
20
vulnerability VCID-skxv-7he3-xqgc
21
vulnerability VCID-udc4-7jnt-y3fu
22
vulnerability VCID-vkrw-y1j6-6fe7
23
vulnerability VCID-w732-52bx-2qf8
24
vulnerability VCID-wt7k-s1yd-nke6
25
vulnerability VCID-xazq-qrm1-9ff6
26
vulnerability VCID-xkah-9nv9-wufd
27
vulnerability VCID-xnz5-gv2x-17bk
28
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.5.2
aliases CVE-2013-0262, GHSA-85r7-w5mv-c849, OSV-89938
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35e6-cpn8-w7h1
1
url VCID-3ycr-9smk-uqdc
vulnerability_id VCID-3ycr-9smk-uqdc
summary
Potential Denial of Service Vulnerability
Carefully crafted requests can cause a `SystemStackError` and potentially cause a denial of service attack.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html
5
reference_url http://openwall.com/lists/oss-security/2015/06/16/14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openwall.com/lists/oss-security/2015/06/16/14
6
reference_url http://rhn.redhat.com/errata/RHSA-2015-2290.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-2290.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3225.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3225.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3225
reference_id
reference_type
scores
0
value 0.10456
scoring_system epss
scoring_elements 0.93227
published_at 2026-04-08T12:55:00Z
1
value 0.10456
scoring_system epss
scoring_elements 0.93255
published_at 2026-04-18T12:55:00Z
2
value 0.10456
scoring_system epss
scoring_elements 0.93251
published_at 2026-04-16T12:55:00Z
3
value 0.10456
scoring_system epss
scoring_elements 0.93234
published_at 2026-04-13T12:55:00Z
4
value 0.10456
scoring_system epss
scoring_elements 0.93231
published_at 2026-04-09T12:55:00Z
5
value 0.10456
scoring_system epss
scoring_elements 0.93232
published_at 2026-04-12T12:55:00Z
6
value 0.10456
scoring_system epss
scoring_elements 0.93235
published_at 2026-04-11T12:55:00Z
7
value 0.10456
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-01T12:55:00Z
8
value 0.10456
scoring_system epss
scoring_elements 0.93216
published_at 2026-04-02T12:55:00Z
9
value 0.10456
scoring_system epss
scoring_elements 0.9322
published_at 2026-04-04T12:55:00Z
10
value 0.10456
scoring_system epss
scoring_elements 0.93218
published_at 2026-04-07T12:55:00Z
11
value 0.13251
scoring_system epss
scoring_elements 0.94171
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3225
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225
10
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
11
reference_url https://github.com/rack/rack/blob/master/HISTORY.md
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/blob/master/HISTORY.md
12
reference_url https://github.com/rack/rack/commits/1.4.6
reference_id
reference_type
scores
url https://github.com/rack/rack/commits/1.4.6
13
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml
14
reference_url https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3225
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3225
16
reference_url http://www.debian.org/security/2015/dsa-3322
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2015/dsa-3322
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1232292
reference_id 1232292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1232292
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789311
reference_id 789311
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789311
19
reference_url https://github.com/advisories/GHSA-rgr4-9jh5-j4j6
reference_id GHSA-rgr4-9jh5-j4j6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rgr4-9jh5-j4j6
20
reference_url https://access.redhat.com/errata/RHSA-2015:2290
reference_id RHSA-2015:2290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2290
fixed_packages
0
url pkg:gem/rack@1.5.4
purl pkg:gem/rack@1.5.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-6c1k-vgv4-93ad
2
vulnerability VCID-7p12-ejdu-uqgy
3
vulnerability VCID-7wvj-9h3p-23am
4
vulnerability VCID-7zgg-tvu3-r7gt
5
vulnerability VCID-8zkw-y3yd-yuft
6
vulnerability VCID-9rpp-9xss-duf6
7
vulnerability VCID-arac-j5h5-zkcu
8
vulnerability VCID-azu5-jcmd-3ufx
9
vulnerability VCID-c21j-snf1-d3cb
10
vulnerability VCID-c5sc-7qnn-mkb9
11
vulnerability VCID-d58r-22kr-9bct
12
vulnerability VCID-fpg2-nhey-rkcc
13
vulnerability VCID-gdhf-e8q1-kbat
14
vulnerability VCID-gtzk-m9rm-57hw
15
vulnerability VCID-npag-sz7d-v7b6
16
vulnerability VCID-qt1u-2p37-xfet
17
vulnerability VCID-s971-gkdg-jkhc
18
vulnerability VCID-skxv-7he3-xqgc
19
vulnerability VCID-udc4-7jnt-y3fu
20
vulnerability VCID-vkrw-y1j6-6fe7
21
vulnerability VCID-w732-52bx-2qf8
22
vulnerability VCID-wt7k-s1yd-nke6
23
vulnerability VCID-xazq-qrm1-9ff6
24
vulnerability VCID-xkah-9nv9-wufd
25
vulnerability VCID-xnz5-gv2x-17bk
26
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.5.4
1
url pkg:gem/rack@1.6.0.beta
purl pkg:gem/rack@1.6.0.beta
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3ycr-9smk-uqdc
1
vulnerability VCID-47ja-djzb-2bbw
2
vulnerability VCID-6c1k-vgv4-93ad
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-9rpp-9xss-duf6
8
vulnerability VCID-arac-j5h5-zkcu
9
vulnerability VCID-azu5-jcmd-3ufx
10
vulnerability VCID-c21j-snf1-d3cb
11
vulnerability VCID-c5sc-7qnn-mkb9
12
vulnerability VCID-d58r-22kr-9bct
13
vulnerability VCID-fpg2-nhey-rkcc
14
vulnerability VCID-gdhf-e8q1-kbat
15
vulnerability VCID-gtzk-m9rm-57hw
16
vulnerability VCID-npag-sz7d-v7b6
17
vulnerability VCID-qt1u-2p37-xfet
18
vulnerability VCID-s971-gkdg-jkhc
19
vulnerability VCID-skxv-7he3-xqgc
20
vulnerability VCID-udc4-7jnt-y3fu
21
vulnerability VCID-vkrw-y1j6-6fe7
22
vulnerability VCID-w732-52bx-2qf8
23
vulnerability VCID-wt7k-s1yd-nke6
24
vulnerability VCID-xazq-qrm1-9ff6
25
vulnerability VCID-xkah-9nv9-wufd
26
vulnerability VCID-xnz5-gv2x-17bk
27
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.6.0.beta
2
url pkg:gem/rack@1.6.2
purl pkg:gem/rack@1.6.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-47ja-djzb-2bbw
1
vulnerability VCID-6c1k-vgv4-93ad
2
vulnerability VCID-7p12-ejdu-uqgy
3
vulnerability VCID-7wvj-9h3p-23am
4
vulnerability VCID-7zgg-tvu3-r7gt
5
vulnerability VCID-8zkw-y3yd-yuft
6
vulnerability VCID-9rpp-9xss-duf6
7
vulnerability VCID-9xy8-h3y1-mubv
8
vulnerability VCID-arac-j5h5-zkcu
9
vulnerability VCID-azu5-jcmd-3ufx
10
vulnerability VCID-c21j-snf1-d3cb
11
vulnerability VCID-c5sc-7qnn-mkb9
12
vulnerability VCID-d58r-22kr-9bct
13
vulnerability VCID-fpg2-nhey-rkcc
14
vulnerability VCID-gdhf-e8q1-kbat
15
vulnerability VCID-gtzk-m9rm-57hw
16
vulnerability VCID-npag-sz7d-v7b6
17
vulnerability VCID-qt1u-2p37-xfet
18
vulnerability VCID-s971-gkdg-jkhc
19
vulnerability VCID-skxv-7he3-xqgc
20
vulnerability VCID-udc4-7jnt-y3fu
21
vulnerability VCID-vkrw-y1j6-6fe7
22
vulnerability VCID-w732-52bx-2qf8
23
vulnerability VCID-wt7k-s1yd-nke6
24
vulnerability VCID-xazq-qrm1-9ff6
25
vulnerability VCID-xkah-9nv9-wufd
26
vulnerability VCID-xnz5-gv2x-17bk
27
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.6.2
aliases CVE-2015-3225, GHSA-rgr4-9jh5-j4j6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ycr-9smk-uqdc
2
url VCID-y12d-fjpf-uubh
vulnerability_id VCID-y12d-fjpf-uubh
summary
Timing attack against Rack::Session::Cookie
Affected versions allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving am HMAC comparison function that does not run in constant time.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
1
reference_url http://rack.github.com/
reference_id
reference_type
scores
url http://rack.github.com/
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0686.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0686.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0263.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0263.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0263
reference_id
reference_type
scores
0
value 0.08626
scoring_system epss
scoring_elements 0.92398
published_at 2026-04-01T12:55:00Z
1
value 0.08626
scoring_system epss
scoring_elements 0.92416
published_at 2026-04-07T12:55:00Z
2
value 0.08626
scoring_system epss
scoring_elements 0.92413
published_at 2026-04-04T12:55:00Z
3
value 0.08626
scoring_system epss
scoring_elements 0.92405
published_at 2026-04-02T12:55:00Z
4
value 0.08626
scoring_system epss
scoring_elements 0.92449
published_at 2026-04-18T12:55:00Z
5
value 0.08626
scoring_system epss
scoring_elements 0.9245
published_at 2026-04-16T12:55:00Z
6
value 0.08626
scoring_system epss
scoring_elements 0.92439
published_at 2026-04-13T12:55:00Z
7
value 0.08626
scoring_system epss
scoring_elements 0.92441
published_at 2026-04-12T12:55:00Z
8
value 0.08626
scoring_system epss
scoring_elements 0.92438
published_at 2026-04-11T12:55:00Z
9
value 0.08626
scoring_system epss
scoring_elements 0.92432
published_at 2026-04-09T12:55:00Z
10
value 0.08626
scoring_system epss
scoring_elements 0.92428
published_at 2026-04-08T12:55:00Z
11
value 0.16071
scoring_system epss
scoring_elements 0.94801
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0263
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=909071
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=909071
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0263
7
reference_url http://secunia.com/advisories/52033
reference_id
reference_type
scores
url http://secunia.com/advisories/52033
8
reference_url http://secunia.com/advisories/52134
reference_id
reference_type
scores
url http://secunia.com/advisories/52134
9
reference_url http://secunia.com/advisories/52774
reference_id
reference_type
scores
url http://secunia.com/advisories/52774
10
reference_url https://gist.github.com/codahale/f9f3781f7b54985bee94
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://gist.github.com/codahale/f9f3781f7b54985bee94
11
reference_url https://github.com/rack/rack
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack
12
reference_url https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07
13
reference_url https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11
14
reference_url https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J
15
reference_url https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
16
reference_url https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ
17
reference_url https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
18
reference_url https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ
19
reference_url https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
20
reference_url https://groups.google.com/forum/#!msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ
21
reference_url https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
22
reference_url https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0263
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-0263
24
reference_url https://puppet.com/security/cve/cve-2013-0263
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2013-0263
25
reference_url https://twitter.com/coda/statuses/299732877745197056
reference_id
reference_type
scores
url https://twitter.com/coda/statuses/299732877745197056
26
reference_url http://www.debian.org/security/2013/dsa-2783
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2013/dsa-2783
27
reference_url http://www.osvdb.org/89939
reference_id
reference_type
scores
url http://www.osvdb.org/89939
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700226
reference_id 700226
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700226
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.9:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*
57
reference_url https://github.com/advisories/GHSA-xc85-32mf-xpv8
reference_id GHSA-xc85-32mf-xpv8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xc85-32mf-xpv8
58
reference_url https://security.gentoo.org/glsa/201405-10
reference_id GLSA-201405-10
reference_type
scores
url https://security.gentoo.org/glsa/201405-10
59
reference_url https://access.redhat.com/errata/RHSA-2013:0686
reference_id RHSA-2013:0686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0686
fixed_packages
0
url pkg:gem/rack@1.5.2
purl pkg:gem/rack@1.5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3ycr-9smk-uqdc
1
vulnerability VCID-47ja-djzb-2bbw
2
vulnerability VCID-6c1k-vgv4-93ad
3
vulnerability VCID-7p12-ejdu-uqgy
4
vulnerability VCID-7wvj-9h3p-23am
5
vulnerability VCID-7zgg-tvu3-r7gt
6
vulnerability VCID-8zkw-y3yd-yuft
7
vulnerability VCID-9rpp-9xss-duf6
8
vulnerability VCID-arac-j5h5-zkcu
9
vulnerability VCID-azu5-jcmd-3ufx
10
vulnerability VCID-c21j-snf1-d3cb
11
vulnerability VCID-c5sc-7qnn-mkb9
12
vulnerability VCID-d58r-22kr-9bct
13
vulnerability VCID-fpg2-nhey-rkcc
14
vulnerability VCID-gdhf-e8q1-kbat
15
vulnerability VCID-gtzk-m9rm-57hw
16
vulnerability VCID-jxws-ws21-4uaa
17
vulnerability VCID-npag-sz7d-v7b6
18
vulnerability VCID-qt1u-2p37-xfet
19
vulnerability VCID-s971-gkdg-jkhc
20
vulnerability VCID-skxv-7he3-xqgc
21
vulnerability VCID-udc4-7jnt-y3fu
22
vulnerability VCID-vkrw-y1j6-6fe7
23
vulnerability VCID-w732-52bx-2qf8
24
vulnerability VCID-wt7k-s1yd-nke6
25
vulnerability VCID-xazq-qrm1-9ff6
26
vulnerability VCID-xkah-9nv9-wufd
27
vulnerability VCID-xnz5-gv2x-17bk
28
vulnerability VCID-yw62-qbkq-9ygq
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rack@1.5.2
aliases CVE-2013-0263, GHSA-xc85-32mf-xpv8, OSV-89939
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y12d-fjpf-uubh
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/rack@1.5