Lookup for vulnerable packages by Package URL.

Purlpkg:gem/rubygems-update@1.3.4
Typegem
Namespace
Namerubygems-update
Version1.3.4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.0.3
Latest_non_vulnerable_version3.0.3
Affected_by_vulnerabilities
0
url VCID-b36p-re17-n7dq
vulnerability_id VCID-b36p-re17-n7dq
summary
Improper Input Validation
RubyGems is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
references
0
reference_url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
1
reference_url https://access.redhat.com/errata/RHSA-2017:3485
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3485
2
reference_url https://access.redhat.com/errata/RHSA-2018:0378
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0378
3
reference_url https://access.redhat.com/errata/RHSA-2018:0583
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0583
4
reference_url https://access.redhat.com/errata/RHSA-2018:0585
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0585
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0900.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0900.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-0900
reference_id
reference_type
scores
0
value 0.11232
scoring_system epss
scoring_elements 0.93533
published_at 2026-04-18T12:55:00Z
1
value 0.11232
scoring_system epss
scoring_elements 0.93476
published_at 2026-04-01T12:55:00Z
2
value 0.11232
scoring_system epss
scoring_elements 0.93484
published_at 2026-04-02T12:55:00Z
3
value 0.11232
scoring_system epss
scoring_elements 0.93491
published_at 2026-04-07T12:55:00Z
4
value 0.11232
scoring_system epss
scoring_elements 0.93499
published_at 2026-04-08T12:55:00Z
5
value 0.11232
scoring_system epss
scoring_elements 0.93502
published_at 2026-04-09T12:55:00Z
6
value 0.11232
scoring_system epss
scoring_elements 0.93507
published_at 2026-04-12T12:55:00Z
7
value 0.11232
scoring_system epss
scoring_elements 0.93508
published_at 2026-04-13T12:55:00Z
8
value 0.11232
scoring_system epss
scoring_elements 0.93527
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-0900
7
reference_url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
17
reference_url https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
18
reference_url https://hackerone.com/reports/243003
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/243003
19
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
20
reference_url https://web.archive.org/web/20190212090616/http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20190212090616/http://www.securitytracker.com/id/1039249
21
reference_url https://web.archive.org/web/20200227143907/http://www.securityfocus.com/bid/100579
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227143907/http://www.securityfocus.com/bid/100579
22
reference_url https://www.debian.org/security/2017/dsa-3966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2017/dsa-3966
23
reference_url http://www.securityfocus.com/bid/100579
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100579
24
reference_url http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039249
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1487588
reference_id 1487588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1487588
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-0900
reference_id CVE-2017-0900
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-0900
27
reference_url https://github.com/advisories/GHSA-p7f2-rr42-m9xm
reference_id GHSA-p7f2-rr42-m9xm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p7f2-rr42-m9xm
28
reference_url https://security.gentoo.org/glsa/201710-01
reference_id GLSA-201710-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201710-01
29
reference_url https://usn.ubuntu.com/3439-1/
reference_id USN-3439-1
reference_type
scores
url https://usn.ubuntu.com/3439-1/
fixed_packages
0
url pkg:gem/rubygems-update@2.6.13
purl pkg:gem/rubygems-update@2.6.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cde2-rv4n-tkau
1
vulnerability VCID-f7x5-hz5f-hyd3
2
vulnerability VCID-ha3g-uyse-wybx
3
vulnerability VCID-jkwe-c323-3yez
4
vulnerability VCID-ky5r-bch5-m7dv
5
vulnerability VCID-xgmc-a5rk-zqag
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13
aliases CVE-2017-0900, GHSA-p7f2-rr42-m9xm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b36p-re17-n7dq
1
url VCID-ee8m-jtmh-dfbs
vulnerability_id VCID-ee8m-jtmh-dfbs
summary
7PK - Security Features
RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-1657.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1657.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3900.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3900.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3900
reference_id
reference_type
scores
0
value 0.02401
scoring_system epss
scoring_elements 0.85069
published_at 2026-04-13T12:55:00Z
1
value 0.02401
scoring_system epss
scoring_elements 0.85007
published_at 2026-04-02T12:55:00Z
2
value 0.02401
scoring_system epss
scoring_elements 0.85024
published_at 2026-04-04T12:55:00Z
3
value 0.02401
scoring_system epss
scoring_elements 0.85028
published_at 2026-04-07T12:55:00Z
4
value 0.02401
scoring_system epss
scoring_elements 0.85051
published_at 2026-04-08T12:55:00Z
5
value 0.02401
scoring_system epss
scoring_elements 0.85058
published_at 2026-04-09T12:55:00Z
6
value 0.02401
scoring_system epss
scoring_elements 0.85074
published_at 2026-04-11T12:55:00Z
7
value 0.02401
scoring_system epss
scoring_elements 0.85072
published_at 2026-04-12T12:55:00Z
8
value 0.02401
scoring_system epss
scoring_elements 0.8509
published_at 2026-04-16T12:55:00Z
9
value 0.02401
scoring_system epss
scoring_elements 0.85092
published_at 2026-04-18T12:55:00Z
10
value 0.02401
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3900
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-3900.yml
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-3900.yml
7
reference_url https://web.archive.org/web/20170331091241/https://puppet.com/security/cve/CVE-2015-3900
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170331091241/https://puppet.com/security/cve/CVE-2015-3900
8
reference_url https://web.archive.org/web/20200228055155/http://www.securityfocus.com/bid/75482
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228055155/http://www.securityfocus.com/bid/75482
9
reference_url https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
10
reference_url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900
11
reference_url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
reference_id
reference_type
scores
url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
12
reference_url http://www.openwall.com/lists/oss-security/2015/06/26/2
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2015/06/26/2
13
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
14
reference_url http://www.securityfocus.com/bid/75482
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/75482
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236116
reference_id 1236116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236116
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3900
reference_id CVE-2015-3900
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3900
17
reference_url https://puppet.com/security/cve/CVE-2015-3900
reference_id CVE-2015-3900
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://puppet.com/security/cve/CVE-2015-3900
18
reference_url http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
reference_id CVE-2015-3900.HTML
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
19
reference_url https://github.com/advisories/GHSA-wp3j-rvfp-624h
reference_id GHSA-wp3j-rvfp-624h
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wp3j-rvfp-624h
20
reference_url https://access.redhat.com/errata/RHSA-2015:1657
reference_id RHSA-2015:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1657
fixed_packages
0
url pkg:gem/rubygems-update@2.0.16
purl pkg:gem/rubygems-update@2.0.16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-xgsa-5umz-qffr
5
vulnerability VCID-xz68-vwz2-2ke4
6
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.16
1
url pkg:gem/rubygems-update@2.1.0.rc.1
purl pkg:gem/rubygems-update@2.1.0.rc.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-k2ga-fgvp-5qc7
5
vulnerability VCID-ucdh-7fgy-33h8
6
vulnerability VCID-xgsa-5umz-qffr
7
vulnerability VCID-xz68-vwz2-2ke4
8
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0.rc.1
2
url pkg:gem/rubygems-update@2.2.4
purl pkg:gem/rubygems-update@2.2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-xgsa-5umz-qffr
5
vulnerability VCID-xz68-vwz2-2ke4
6
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.2.4
3
url pkg:gem/rubygems-update@2.4.7
purl pkg:gem/rubygems-update@2.4.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8d7n-bfhu-dkfd
1
vulnerability VCID-8hm4-c4w4-gfen
2
vulnerability VCID-9t45-d5mf-3uar
3
vulnerability VCID-af1f-xwwy-jfa8
4
vulnerability VCID-b36p-re17-n7dq
5
vulnerability VCID-cde2-rv4n-tkau
6
vulnerability VCID-jmzh-89dm-r7g2
7
vulnerability VCID-mamm-cvdr-subf
8
vulnerability VCID-tq93-h2ag-s3bx
9
vulnerability VCID-w4ns-f42m-pyec
10
vulnerability VCID-xgsa-5umz-qffr
11
vulnerability VCID-xz68-vwz2-2ke4
12
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.4.7
aliases CVE-2015-3900, GHSA-wp3j-rvfp-624h, OSV-122162
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ee8m-jtmh-dfbs
2
url VCID-fx2c-u8eb-dufe
vulnerability_id VCID-fx2c-u8eb-dufe
summary
HTTP Request Smuggling
RubyGems can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-1203.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1203.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1441.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1441.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1852.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1852.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2125.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2125.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2125
reference_id
reference_type
scores
0
value 0.00638
scoring_system epss
scoring_elements 0.70554
published_at 2026-04-18T12:55:00Z
1
value 0.00638
scoring_system epss
scoring_elements 0.7047
published_at 2026-04-04T12:55:00Z
2
value 0.00638
scoring_system epss
scoring_elements 0.70447
published_at 2026-04-07T12:55:00Z
3
value 0.00638
scoring_system epss
scoring_elements 0.70493
published_at 2026-04-08T12:55:00Z
4
value 0.00638
scoring_system epss
scoring_elements 0.70508
published_at 2026-04-09T12:55:00Z
5
value 0.00638
scoring_system epss
scoring_elements 0.70531
published_at 2026-04-11T12:55:00Z
6
value 0.00638
scoring_system epss
scoring_elements 0.70516
published_at 2026-04-12T12:55:00Z
7
value 0.00638
scoring_system epss
scoring_elements 0.70502
published_at 2026-04-13T12:55:00Z
8
value 0.00638
scoring_system epss
scoring_elements 0.70546
published_at 2026-04-16T12:55:00Z
9
value 0.00638
scoring_system epss
scoring_elements 0.70439
published_at 2026-04-01T12:55:00Z
10
value 0.00638
scoring_system epss
scoring_elements 0.70452
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2125
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814718
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=814718
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2125
7
reference_url http://secunia.com/advisories/55381
reference_id
reference_type
scores
url http://secunia.com/advisories/55381
8
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
9
reference_url https://github.com/rubygems/rubygems/blob/1.8/History.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/blob/1.8/History.txt
10
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2012-2125.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2012-2125.yml
11
reference_url http://www.openwall.com/lists/oss-security/2012/04/20/24
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/04/20/24
12
reference_url http://www.ubuntu.com/usn/USN-1582-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1582-1
13
reference_url http://www.ubuntu.com/usn/USN-1582-1/
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1582-1/
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670228
reference_id 670228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670228
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2125
reference_id CVE-2012-2125
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-2125
16
reference_url https://github.com/advisories/GHSA-228f-g3h7-3fj3
reference_id GHSA-228f-g3h7-3fj3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-228f-g3h7-3fj3
17
reference_url https://access.redhat.com/errata/RHSA-2013:1203
reference_id RHSA-2013:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1203
18
reference_url https://access.redhat.com/errata/RHSA-2013:1441
reference_id RHSA-2013:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1441
19
reference_url https://access.redhat.com/errata/RHSA-2013:1852
reference_id RHSA-2013:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1852
20
reference_url https://usn.ubuntu.com/1582-1/
reference_id USN-1582-1
reference_type
scores
url https://usn.ubuntu.com/1582-1/
21
reference_url https://usn.ubuntu.com/1583-1/
reference_id USN-1583-1
reference_type
scores
url https://usn.ubuntu.com/1583-1/
fixed_packages
0
url pkg:gem/rubygems-update@1.8.23
purl pkg:gem/rubygems-update@1.8.23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-ee8m-jtmh-dfbs
2
vulnerability VCID-jmzh-89dm-r7g2
3
vulnerability VCID-k2ga-fgvp-5qc7
4
vulnerability VCID-ucdh-7fgy-33h8
5
vulnerability VCID-xgsa-5umz-qffr
6
vulnerability VCID-xz68-vwz2-2ke4
7
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.23
aliases CVE-2012-2125, GHSA-228f-g3h7-3fj3, OSV-85809
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fx2c-u8eb-dufe
3
url VCID-hpng-v58x-xua5
vulnerability_id VCID-hpng-v58x-xua5
summary
Cryptographic Issues
RubyGems does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-1203.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1203.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1441.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1441.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1852.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1852.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2126.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2126.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2126
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50714
published_at 2026-04-18T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50629
published_at 2026-04-02T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50656
published_at 2026-04-04T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50611
published_at 2026-04-07T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50666
published_at 2026-04-08T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50662
published_at 2026-04-09T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50705
published_at 2026-04-11T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50682
published_at 2026-04-12T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50667
published_at 2026-04-13T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.50709
published_at 2026-04-16T12:55:00Z
10
value 0.00272
scoring_system epss
scoring_elements 0.50577
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2126
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814718
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=814718
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2126
7
reference_url http://secunia.com/advisories/55381
reference_id
reference_type
scores
url http://secunia.com/advisories/55381
8
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
9
reference_url https://github.com/rubygems/rubygems/blob/1.8/History.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/blob/1.8/History.txt
10
reference_url https://github.com/rubygems/rubygems/commit/d4c7eafb8efe1e13a7abf5be5a5b4548870b15b7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/d4c7eafb8efe1e13a7abf5be5a5b4548870b15b7
11
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2012-2126.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2012-2126.yml
12
reference_url http://www.openwall.com/lists/oss-security/2012/04/20/24
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/04/20/24
13
reference_url http://www.ubuntu.com/usn/USN-1582-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1582-1
14
reference_url http://www.ubuntu.com/usn/USN-1582-1/
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1582-1/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670228
reference_id 670228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670228
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2126
reference_id CVE-2012-2126
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-2126
17
reference_url https://github.com/advisories/GHSA-5mgj-mvv8-46mw
reference_id GHSA-5mgj-mvv8-46mw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5mgj-mvv8-46mw
18
reference_url https://access.redhat.com/errata/RHSA-2013:1203
reference_id RHSA-2013:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1203
19
reference_url https://access.redhat.com/errata/RHSA-2013:1441
reference_id RHSA-2013:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1441
20
reference_url https://access.redhat.com/errata/RHSA-2013:1852
reference_id RHSA-2013:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1852
21
reference_url https://usn.ubuntu.com/1582-1/
reference_id USN-1582-1
reference_type
scores
url https://usn.ubuntu.com/1582-1/
22
reference_url https://usn.ubuntu.com/1583-1/
reference_id USN-1583-1
reference_type
scores
url https://usn.ubuntu.com/1583-1/
fixed_packages
0
url pkg:gem/rubygems-update@1.8.23
purl pkg:gem/rubygems-update@1.8.23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-ee8m-jtmh-dfbs
2
vulnerability VCID-jmzh-89dm-r7g2
3
vulnerability VCID-k2ga-fgvp-5qc7
4
vulnerability VCID-ucdh-7fgy-33h8
5
vulnerability VCID-xgsa-5umz-qffr
6
vulnerability VCID-xz68-vwz2-2ke4
7
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.23
aliases CVE-2012-2126, GHSA-5mgj-mvv8-46mw, OSV-81444
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpng-v58x-xua5
4
url VCID-jmzh-89dm-r7g2
vulnerability_id VCID-jmzh-89dm-r7g2
summary
Origin Validation Error
RubyGems is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
references
0
reference_url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
1
reference_url https://access.redhat.com/errata/RHSA-2017:3485
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3485
2
reference_url https://access.redhat.com/errata/RHSA-2018:0378
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0378
3
reference_url https://access.redhat.com/errata/RHSA-2018:0583
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0583
4
reference_url https://access.redhat.com/errata/RHSA-2018:0585
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0585
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0902.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0902.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-0902
reference_id
reference_type
scores
0
value 0.05207
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-13T12:55:00Z
1
value 0.05207
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-09T12:55:00Z
2
value 0.05207
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-08T12:55:00Z
3
value 0.05207
scoring_system epss
scoring_elements 0.8995
published_at 2026-04-16T12:55:00Z
4
value 0.05207
scoring_system epss
scoring_elements 0.89894
published_at 2026-04-01T12:55:00Z
5
value 0.05207
scoring_system epss
scoring_elements 0.89898
published_at 2026-04-02T12:55:00Z
6
value 0.05207
scoring_system epss
scoring_elements 0.8991
published_at 2026-04-04T12:55:00Z
7
value 0.05207
scoring_system epss
scoring_elements 0.89952
published_at 2026-04-18T12:55:00Z
8
value 0.05207
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-12T12:55:00Z
9
value 0.05207
scoring_system epss
scoring_elements 0.89915
published_at 2026-04-07T12:55:00Z
10
value 0.05207
scoring_system epss
scoring_elements 0.89945
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-0902
7
reference_url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements
url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
17
reference_url https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
18
reference_url https://hackerone.com/reports/218088
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/218088
19
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
20
reference_url https://usn.ubuntu.com/3553-1
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3553-1
21
reference_url https://usn.ubuntu.com/3553-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3553-1/
22
reference_url https://usn.ubuntu.com/3685-1
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3685-1
23
reference_url https://usn.ubuntu.com/3685-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3685-1/
24
reference_url https://web.archive.org/web/20170907040741/http://www.securityfocus.com/bid/100586
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170907040741/http://www.securityfocus.com/bid/100586
25
reference_url https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249
26
reference_url https://www.debian.org/security/2017/dsa-3966
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2017/dsa-3966
27
reference_url http://www.securityfocus.com/bid/100586
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100586
28
reference_url http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039249
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1487589
reference_id 1487589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1487589
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-0902
reference_id CVE-2017-0902
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-0902
31
reference_url https://github.com/advisories/GHSA-73w7-6w9g-gc8w
reference_id GHSA-73w7-6w9g-gc8w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-73w7-6w9g-gc8w
32
reference_url https://security.gentoo.org/glsa/201710-01
reference_id GLSA-201710-01
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201710-01
fixed_packages
0
url pkg:gem/rubygems-update@2.6.13
purl pkg:gem/rubygems-update@2.6.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cde2-rv4n-tkau
1
vulnerability VCID-f7x5-hz5f-hyd3
2
vulnerability VCID-ha3g-uyse-wybx
3
vulnerability VCID-jkwe-c323-3yez
4
vulnerability VCID-ky5r-bch5-m7dv
5
vulnerability VCID-xgmc-a5rk-zqag
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13
aliases CVE-2017-0902, GHSA-73w7-6w9g-gc8w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmzh-89dm-r7g2
5
url VCID-k2ga-fgvp-5qc7
vulnerability_id VCID-k2ga-fgvp-5qc7
summary
Cryptographic Issues
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-1427.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1427.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1441.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1441.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1523.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1523.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1852.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1852.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-0207.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0207.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4287.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4287.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4287
reference_id
reference_type
scores
0
value 0.02017
scoring_system epss
scoring_elements 0.83773
published_at 2026-04-18T12:55:00Z
1
value 0.02017
scoring_system epss
scoring_elements 0.83673
published_at 2026-04-01T12:55:00Z
2
value 0.02017
scoring_system epss
scoring_elements 0.83686
published_at 2026-04-02T12:55:00Z
3
value 0.02017
scoring_system epss
scoring_elements 0.837
published_at 2026-04-04T12:55:00Z
4
value 0.02017
scoring_system epss
scoring_elements 0.83703
published_at 2026-04-07T12:55:00Z
5
value 0.02017
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-08T12:55:00Z
6
value 0.02017
scoring_system epss
scoring_elements 0.83733
published_at 2026-04-09T12:55:00Z
7
value 0.02017
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-11T12:55:00Z
8
value 0.02017
scoring_system epss
scoring_elements 0.83743
published_at 2026-04-12T12:55:00Z
9
value 0.02017
scoring_system epss
scoring_elements 0.83738
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4287
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287
8
reference_url http://secunia.com/advisories/55381
reference_id
reference_type
scores
url http://secunia.com/advisories/55381
9
reference_url https://github.com/rubygems/rubygems/blob/03a074e8838683f45611b119fd8f363aa44fe2fd/CHANGELOG.md
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/blob/03a074e8838683f45611b119fd8f363aa44fe2fd/CHANGELOG.md
10
reference_url https://github.com/rubygems/rubygems/commit/938a7e31ac73655845ab9045629ff3f580a125da
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/938a7e31ac73655845ab9045629ff3f580a125da
11
reference_url https://github.com/rubygems/rubygems/commit/b697536f2455e8c8853cf5cf8a1017a36031ed67
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/b697536f2455e8c8853cf5cf8a1017a36031ed67
12
reference_url https://github.com/rubygems/rubygems/commit/b9baec03145aed684d1cd3c87dcac3cc06becd9b
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/b9baec03145aed684d1cd3c87dcac3cc06becd9b
13
reference_url https://github.com/rubygems/rubygems/commit/ed733bc379d75620f5be4213f89d1d7b38be3191
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/ed733bc379d75620f5be4213f89d1d7b38be3191
14
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4287.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4287.yml
15
reference_url https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287
16
reference_url http://www.openwall.com/lists/oss-security/2013/09/10/1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/09/10/1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1002364
reference_id 1002364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1002364
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361
reference_id 722361
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4287
reference_id CVE-2013-4287
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4287
20
reference_url https://puppet.com/security/cve/cve-2013-4287
reference_id CVE-2013-4287
reference_type
scores
url https://puppet.com/security/cve/cve-2013-4287
21
reference_url https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287/
reference_id CVE-2013-4287
reference_type
scores
url https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287/
22
reference_url http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
reference_id CVE-2013-4287.HTML
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
23
reference_url https://github.com/advisories/GHSA-9j7m-rjqx-48vh
reference_id GHSA-9j7m-rjqx-48vh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9j7m-rjqx-48vh
24
reference_url https://access.redhat.com/errata/RHSA-2013:1427
reference_id RHSA-2013:1427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1427
25
reference_url https://access.redhat.com/errata/RHSA-2013:1441
reference_id RHSA-2013:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1441
26
reference_url https://access.redhat.com/errata/RHSA-2013:1523
reference_id RHSA-2013:1523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1523
27
reference_url https://access.redhat.com/errata/RHSA-2013:1852
reference_id RHSA-2013:1852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1852
28
reference_url https://access.redhat.com/errata/RHSA-2014:0207
reference_id RHSA-2014:0207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0207
fixed_packages
0
url pkg:gem/rubygems-update@1.8.23.1
purl pkg:gem/rubygems-update@1.8.23.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.23.1
1
url pkg:gem/rubygems-update@1.8.26
purl pkg:gem/rubygems-update@1.8.26
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-ee8m-jtmh-dfbs
2
vulnerability VCID-jmzh-89dm-r7g2
3
vulnerability VCID-k2ga-fgvp-5qc7
4
vulnerability VCID-ucdh-7fgy-33h8
5
vulnerability VCID-xgsa-5umz-qffr
6
vulnerability VCID-xz68-vwz2-2ke4
7
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.26
2
url pkg:gem/rubygems-update@2.0.8
purl pkg:gem/rubygems-update@2.0.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-k2ga-fgvp-5qc7
5
vulnerability VCID-ucdh-7fgy-33h8
6
vulnerability VCID-xgsa-5umz-qffr
7
vulnerability VCID-xz68-vwz2-2ke4
8
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.8
3
url pkg:gem/rubygems-update@2.1.0.rc.1
purl pkg:gem/rubygems-update@2.1.0.rc.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-k2ga-fgvp-5qc7
5
vulnerability VCID-ucdh-7fgy-33h8
6
vulnerability VCID-xgsa-5umz-qffr
7
vulnerability VCID-xz68-vwz2-2ke4
8
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0.rc.1
4
url pkg:gem/rubygems-update@2.1.0
purl pkg:gem/rubygems-update@2.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-k2ga-fgvp-5qc7
5
vulnerability VCID-ucdh-7fgy-33h8
6
vulnerability VCID-xgsa-5umz-qffr
7
vulnerability VCID-xz68-vwz2-2ke4
8
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0
5
url pkg:gem/rubygems-update@2.1.1
purl pkg:gem/rubygems-update@2.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-ucdh-7fgy-33h8
5
vulnerability VCID-xgsa-5umz-qffr
6
vulnerability VCID-xz68-vwz2-2ke4
7
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.1
aliases CVE-2013-4287, GHSA-9j7m-rjqx-48vh, OSV-97163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ga-fgvp-5qc7
6
url VCID-ucdh-7fgy-33h8
vulnerability_id VCID-ucdh-7fgy-33h8
summary
Cryptographic Issues
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4363.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4363
reference_id
reference_type
scores
0
value 0.00588
scoring_system epss
scoring_elements 0.69174
published_at 2026-04-18T12:55:00Z
1
value 0.00588
scoring_system epss
scoring_elements 0.69166
published_at 2026-04-16T12:55:00Z
2
value 0.00588
scoring_system epss
scoring_elements 0.69127
published_at 2026-04-13T12:55:00Z
3
value 0.00588
scoring_system epss
scoring_elements 0.69156
published_at 2026-04-12T12:55:00Z
4
value 0.00588
scoring_system epss
scoring_elements 0.69172
published_at 2026-04-11T12:55:00Z
5
value 0.00588
scoring_system epss
scoring_elements 0.6915
published_at 2026-04-09T12:55:00Z
6
value 0.00588
scoring_system epss
scoring_elements 0.69062
published_at 2026-04-01T12:55:00Z
7
value 0.00588
scoring_system epss
scoring_elements 0.69078
published_at 2026-04-02T12:55:00Z
8
value 0.00588
scoring_system epss
scoring_elements 0.69131
published_at 2026-04-08T12:55:00Z
9
value 0.00588
scoring_system epss
scoring_elements 0.69081
published_at 2026-04-07T12:55:00Z
10
value 0.00588
scoring_system epss
scoring_elements 0.691
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363
3
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
4
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml
5
reference_url https://web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363
6
reference_url http://www.openwall.com/lists/oss-security/2013/09/14/3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/09/14/3
7
reference_url http://www.openwall.com/lists/oss-security/2013/09/18/8
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/09/18/8
8
reference_url http://www.openwall.com/lists/oss-security/2013/09/20/1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/09/20/1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009720
reference_id 1009720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009720
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361
reference_id 722361
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4363
reference_id CVE-2013-4363
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4363
12
reference_url https://puppet.com/security/cve/cve-2013-4363
reference_id CVE-2013-4363
reference_type
scores
url https://puppet.com/security/cve/cve-2013-4363
13
reference_url http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
reference_id CVE-2013-4363.HTML
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
14
reference_url https://github.com/advisories/GHSA-9qvm-2vhf-q649
reference_id GHSA-9qvm-2vhf-q649
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9qvm-2vhf-q649
fixed_packages
0
url pkg:gem/rubygems-update@1.8.23.2
purl pkg:gem/rubygems-update@1.8.23.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-ee8m-jtmh-dfbs
2
vulnerability VCID-jmzh-89dm-r7g2
3
vulnerability VCID-k2ga-fgvp-5qc7
4
vulnerability VCID-ucdh-7fgy-33h8
5
vulnerability VCID-xgsa-5umz-qffr
6
vulnerability VCID-xz68-vwz2-2ke4
7
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.23.2
1
url pkg:gem/rubygems-update@1.8.27
purl pkg:gem/rubygems-update@1.8.27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-ee8m-jtmh-dfbs
2
vulnerability VCID-jmzh-89dm-r7g2
3
vulnerability VCID-k2ga-fgvp-5qc7
4
vulnerability VCID-ucdh-7fgy-33h8
5
vulnerability VCID-xgsa-5umz-qffr
6
vulnerability VCID-xz68-vwz2-2ke4
7
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.27
2
url pkg:gem/rubygems-update@2.0.10
purl pkg:gem/rubygems-update@2.0.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-k2ga-fgvp-5qc7
5
vulnerability VCID-ucdh-7fgy-33h8
6
vulnerability VCID-xgsa-5umz-qffr
7
vulnerability VCID-xz68-vwz2-2ke4
8
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.10
3
url pkg:gem/rubygems-update@2.1.4
purl pkg:gem/rubygems-update@2.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-xgsa-5umz-qffr
5
vulnerability VCID-xz68-vwz2-2ke4
6
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.4
4
url pkg:gem/rubygems-update@2.1.5
purl pkg:gem/rubygems-update@2.1.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-xgsa-5umz-qffr
5
vulnerability VCID-xz68-vwz2-2ke4
6
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.5
aliases CVE-2013-4363, GHSA-9qvm-2vhf-q649
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucdh-7fgy-33h8
7
url VCID-xgsa-5umz-qffr
vulnerability_id VCID-xgsa-5umz-qffr
summary
Code Injection
RubyGems is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
references
0
reference_url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
1
reference_url https://access.redhat.com/errata/RHSA-2017:3485
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3485
2
reference_url https://access.redhat.com/errata/RHSA-2018:0378
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0378
3
reference_url https://access.redhat.com/errata/RHSA-2018:0583
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0583
4
reference_url https://access.redhat.com/errata/RHSA-2018:0585
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0585
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0899.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0899.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-0899
reference_id
reference_type
scores
0
value 0.07362
scoring_system epss
scoring_elements 0.91729
published_at 2026-04-18T12:55:00Z
1
value 0.07362
scoring_system epss
scoring_elements 0.91672
published_at 2026-04-01T12:55:00Z
2
value 0.07362
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-02T12:55:00Z
3
value 0.07362
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-04T12:55:00Z
4
value 0.07362
scoring_system epss
scoring_elements 0.91695
published_at 2026-04-07T12:55:00Z
5
value 0.07362
scoring_system epss
scoring_elements 0.91707
published_at 2026-04-08T12:55:00Z
6
value 0.07362
scoring_system epss
scoring_elements 0.91714
published_at 2026-04-09T12:55:00Z
7
value 0.07362
scoring_system epss
scoring_elements 0.91717
published_at 2026-04-11T12:55:00Z
8
value 0.07362
scoring_system epss
scoring_elements 0.9172
published_at 2026-04-12T12:55:00Z
9
value 0.07362
scoring_system epss
scoring_elements 0.91716
published_at 2026-04-13T12:55:00Z
10
value 0.07362
scoring_system epss
scoring_elements 0.91736
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-0899
7
reference_url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
17
reference_url https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
18
reference_url https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
19
reference_url https://hackerone.com/reports/226335
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/226335
20
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
21
reference_url https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249
22
reference_url https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100576#:~:text=1%20snapshot-,11%3A49%3A33,-Note
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100576#:~:text=1%20snapshot-,11%3A49%3A33,-Note
23
reference_url https://www.debian.org/security/2017/dsa-3966
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2017/dsa-3966
24
reference_url http://www.securityfocus.com/bid/100576
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100576
25
reference_url http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039249
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1487590
reference_id 1487590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1487590
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-0899
reference_id CVE-2017-0899
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-0899
28
reference_url https://github.com/advisories/GHSA-7gcp-2gmq-w3xh
reference_id GHSA-7gcp-2gmq-w3xh
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7gcp-2gmq-w3xh
29
reference_url https://security.gentoo.org/glsa/201710-01
reference_id GLSA-201710-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201710-01
30
reference_url https://usn.ubuntu.com/3439-1/
reference_id USN-3439-1
reference_type
scores
url https://usn.ubuntu.com/3439-1/
fixed_packages
0
url pkg:gem/rubygems-update@2.6.13
purl pkg:gem/rubygems-update@2.6.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cde2-rv4n-tkau
1
vulnerability VCID-f7x5-hz5f-hyd3
2
vulnerability VCID-ha3g-uyse-wybx
3
vulnerability VCID-jkwe-c323-3yez
4
vulnerability VCID-ky5r-bch5-m7dv
5
vulnerability VCID-xgmc-a5rk-zqag
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13
aliases CVE-2017-0899, GHSA-7gcp-2gmq-w3xh
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xgsa-5umz-qffr
8
url VCID-xz68-vwz2-2ke4
vulnerability_id VCID-xz68-vwz2-2ke4
summary
Improper Input Validation
RubyGems fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
references
0
reference_url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2017/08/27/2.6.13-released.html
1
reference_url https://access.redhat.com/errata/RHSA-2017:3485
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:3485
2
reference_url https://access.redhat.com/errata/RHSA-2018:0378
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0378
3
reference_url https://access.redhat.com/errata/RHSA-2018:0583
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0583
4
reference_url https://access.redhat.com/errata/RHSA-2018:0585
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0585
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0901.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0901.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-0901
reference_id
reference_type
scores
0
value 0.18555
scoring_system epss
scoring_elements 0.95229
published_at 2026-04-02T12:55:00Z
1
value 0.18555
scoring_system epss
scoring_elements 0.95262
published_at 2026-04-16T12:55:00Z
2
value 0.18555
scoring_system epss
scoring_elements 0.95254
published_at 2026-04-13T12:55:00Z
3
value 0.18555
scoring_system epss
scoring_elements 0.95265
published_at 2026-04-18T12:55:00Z
4
value 0.18555
scoring_system epss
scoring_elements 0.95245
published_at 2026-04-09T12:55:00Z
5
value 0.18555
scoring_system epss
scoring_elements 0.95242
published_at 2026-04-08T12:55:00Z
6
value 0.18555
scoring_system epss
scoring_elements 0.95234
published_at 2026-04-07T12:55:00Z
7
value 0.18555
scoring_system epss
scoring_elements 0.95231
published_at 2026-04-04T12:55:00Z
8
value 0.18555
scoring_system epss
scoring_elements 0.95217
published_at 2026-04-01T12:55:00Z
9
value 0.18555
scoring_system epss
scoring_elements 0.95251
published_at 2026-04-12T12:55:00Z
10
value 0.18555
scoring_system epss
scoring_elements 0.9525
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-0901
7
reference_url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://blog.rubygems.org/2017/08/27/2.6.13-released.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:C/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
17
reference_url https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
18
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
19
reference_url https://usn.ubuntu.com/3553-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3553-1
20
reference_url https://usn.ubuntu.com/3553-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3553-1/
21
reference_url https://usn.ubuntu.com/3685-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3685-1
22
reference_url https://usn.ubuntu.com/3685-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3685-1/
23
reference_url https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249
24
reference_url https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100580#:~:text=1%20snapshot-,16%3A05%3A26,-Note
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100580#:~:text=1%20snapshot-,16%3A05%3A26,-Note
25
reference_url https://www.debian.org/security/2017/dsa-3966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2017/dsa-3966
26
reference_url https://www.exploit-db.com/exploits/42611
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.exploit-db.com/exploits/42611
27
reference_url https://www.exploit-db.com/exploits/42611/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/42611/
28
reference_url http://www.securityfocus.com/bid/100580
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100580
29
reference_url http://www.securitytracker.com/id/1039249
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039249
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1487587
reference_id 1487587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1487587
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42611.txt
reference_id CVE-2017-0901
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42611.txt
32
reference_url https://hackerone.com/reports/243156
reference_id CVE-2017-0901
reference_type exploit
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/243156
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-0901
reference_id CVE-2017-0901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-0901
34
reference_url https://github.com/advisories/GHSA-pm9x-4392-2c2p
reference_id GHSA-pm9x-4392-2c2p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pm9x-4392-2c2p
35
reference_url https://security.gentoo.org/glsa/201710-01
reference_id GLSA-201710-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201710-01
36
reference_url https://usn.ubuntu.com/3439-1/
reference_id USN-3439-1
reference_type
scores
url https://usn.ubuntu.com/3439-1/
fixed_packages
0
url pkg:gem/rubygems-update@2.6.13
purl pkg:gem/rubygems-update@2.6.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cde2-rv4n-tkau
1
vulnerability VCID-f7x5-hz5f-hyd3
2
vulnerability VCID-ha3g-uyse-wybx
3
vulnerability VCID-jkwe-c323-3yez
4
vulnerability VCID-ky5r-bch5-m7dv
5
vulnerability VCID-xgmc-a5rk-zqag
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13
aliases CVE-2017-0901, GHSA-pm9x-4392-2c2p
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xz68-vwz2-2ke4
9
url VCID-zb9m-getz-3keh
vulnerability_id VCID-zb9m-getz-3keh
summary
Improper Input Validation
RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.
references
0
reference_url http://blog.rubygems.org/2015/06/08/2.2.5-released.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2015/06/08/2.2.5-released.html
1
reference_url http://blog.rubygems.org/2015/06/08/2.4.8-released.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blog.rubygems.org/2015/06/08/2.4.8-released.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4020.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4020
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66958
published_at 2026-04-16T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66925
published_at 2026-04-13T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66956
published_at 2026-04-12T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.6697
published_at 2026-04-11T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.6695
published_at 2026-04-09T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66937
published_at 2026-04-08T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-04T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66888
published_at 2026-04-07T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66972
published_at 2026-04-18T12:55:00Z
9
value 0.00524
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4020
4
reference_url https://github.com/rubygems/rubygems
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems
5
reference_url https://github.com/rubygems/rubygems/commit/5c7bfb5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems/commit/5c7bfb5
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-4020.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-4020.yml
7
reference_url https://web.archive.org/web/20200228084212/http://www.securityfocus.com/bid/75431
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228084212/http://www.securityfocus.com/bid/75431
8
reference_url https://web.archive.org/web/20200228085830/https://puppet.com/security/cve/CVE-2015-3900
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228085830/https://puppet.com/security/cve/CVE-2015-3900
9
reference_url https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478
10
reference_url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900
11
reference_url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
reference_id
reference_type
scores
url https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
13
reference_url http://www.securityfocus.com/bid/75431
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/75431
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1250109
reference_id 1250109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1250109
15
reference_url https://puppet.com/security/cve/CVE-2015-3900
reference_id CVE-2015-3900
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://puppet.com/security/cve/CVE-2015-3900
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4020
reference_id CVE-2015-4020
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-4020
17
reference_url https://github.com/advisories/GHSA-qv62-xfj6-32xm
reference_id GHSA-qv62-xfj6-32xm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qv62-xfj6-32xm
fixed_packages
0
url pkg:gem/rubygems-update@2.0.17
purl pkg:gem/rubygems-update@2.0.17
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-xgsa-5umz-qffr
5
vulnerability VCID-xz68-vwz2-2ke4
6
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.17
1
url pkg:gem/rubygems-update@2.1.0.rc.1
purl pkg:gem/rubygems-update@2.1.0.rc.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-k2ga-fgvp-5qc7
5
vulnerability VCID-ucdh-7fgy-33h8
6
vulnerability VCID-xgsa-5umz-qffr
7
vulnerability VCID-xz68-vwz2-2ke4
8
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0.rc.1
2
url pkg:gem/rubygems-update@2.2.5
purl pkg:gem/rubygems-update@2.2.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b36p-re17-n7dq
1
vulnerability VCID-cde2-rv4n-tkau
2
vulnerability VCID-ee8m-jtmh-dfbs
3
vulnerability VCID-jmzh-89dm-r7g2
4
vulnerability VCID-xgsa-5umz-qffr
5
vulnerability VCID-xz68-vwz2-2ke4
6
vulnerability VCID-zb9m-getz-3keh
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.2.5
3
url pkg:gem/rubygems-update@2.4.8
purl pkg:gem/rubygems-update@2.4.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8d7n-bfhu-dkfd
1
vulnerability VCID-8hm4-c4w4-gfen
2
vulnerability VCID-9t45-d5mf-3uar
3
vulnerability VCID-af1f-xwwy-jfa8
4
vulnerability VCID-b36p-re17-n7dq
5
vulnerability VCID-cde2-rv4n-tkau
6
vulnerability VCID-jmzh-89dm-r7g2
7
vulnerability VCID-mamm-cvdr-subf
8
vulnerability VCID-tq93-h2ag-s3bx
9
vulnerability VCID-w4ns-f42m-pyec
10
vulnerability VCID-xgsa-5umz-qffr
11
vulnerability VCID-xz68-vwz2-2ke4
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.4.8
aliases CVE-2015-4020, GHSA-qv62-xfj6-32xm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb9m-getz-3keh
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.3.4