Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rubygem-json@1.7.3-2?arch=el6op
Typerpm
Namespaceredhat
Namerubygem-json
Version1.7.3-2
Qualifiers
arch el6op
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1r79-ts6t-hufh
vulnerability_id VCID-1r79-ts6t-hufh
summary Enterprise: gears fail to properly isolate network traffic
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-1796.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1796.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1906.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1906.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3674.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3674
reference_id
reference_type
scores
0
value 0.004
scoring_system epss
scoring_elements 0.60843
published_at 2026-05-14T12:55:00Z
1
value 0.004
scoring_system epss
scoring_elements 0.60582
published_at 2026-04-01T12:55:00Z
2
value 0.004
scoring_system epss
scoring_elements 0.60657
published_at 2026-04-02T12:55:00Z
3
value 0.004
scoring_system epss
scoring_elements 0.60685
published_at 2026-04-04T12:55:00Z
4
value 0.004
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-07T12:55:00Z
5
value 0.004
scoring_system epss
scoring_elements 0.60703
published_at 2026-04-08T12:55:00Z
6
value 0.004
scoring_system epss
scoring_elements 0.60719
published_at 2026-04-09T12:55:00Z
7
value 0.004
scoring_system epss
scoring_elements 0.60743
published_at 2026-04-11T12:55:00Z
8
value 0.004
scoring_system epss
scoring_elements 0.6073
published_at 2026-04-12T12:55:00Z
9
value 0.004
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-13T12:55:00Z
10
value 0.004
scoring_system epss
scoring_elements 0.60754
published_at 2026-04-16T12:55:00Z
11
value 0.004
scoring_system epss
scoring_elements 0.6076
published_at 2026-04-18T12:55:00Z
12
value 0.004
scoring_system epss
scoring_elements 0.60745
published_at 2026-04-21T12:55:00Z
13
value 0.004
scoring_system epss
scoring_elements 0.60733
published_at 2026-04-24T12:55:00Z
14
value 0.004
scoring_system epss
scoring_elements 0.60746
published_at 2026-04-26T12:55:00Z
15
value 0.004
scoring_system epss
scoring_elements 0.60738
published_at 2026-05-07T12:55:00Z
16
value 0.004
scoring_system epss
scoring_elements 0.60692
published_at 2026-05-05T12:55:00Z
17
value 0.004
scoring_system epss
scoring_elements 0.60795
published_at 2026-05-09T12:55:00Z
18
value 0.004
scoring_system epss
scoring_elements 0.60757
published_at 2026-05-11T12:55:00Z
19
value 0.004
scoring_system epss
scoring_elements 0.60783
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3674
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1148170
reference_id 1148170
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1148170
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3674
reference_id CVE-2014-3674
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3674
22
reference_url https://access.redhat.com/errata/RHSA-2014:1796
reference_id RHSA-2014:1796
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1796
23
reference_url https://access.redhat.com/errata/RHSA-2014:1906
reference_id RHSA-2014:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1906
fixed_packages
aliases CVE-2014-3674
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1r79-ts6t-hufh
1
url VCID-5ey2-dm5w-y7a6
vulnerability_id VCID-5ey2-dm5w-y7a6
summary OpenShift: /proc/net/tcp information disclosure
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-1796.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1796.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1906.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1906.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3602.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3602.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3602
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15214
published_at 2026-05-14T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.1515
published_at 2026-04-01T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15191
published_at 2026-04-02T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15259
published_at 2026-04-04T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15061
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15149
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.152
published_at 2026-04-09T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.1517
published_at 2026-04-11T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15132
published_at 2026-04-12T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14967
published_at 2026-04-16T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.14977
published_at 2026-04-18T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15028
published_at 2026-04-21T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15067
published_at 2026-04-24T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.15069
published_at 2026-04-26T12:55:00Z
15
value 0.00049
scoring_system epss
scoring_elements 0.15012
published_at 2026-04-29T12:55:00Z
16
value 0.00049
scoring_system epss
scoring_elements 0.14882
published_at 2026-05-05T12:55:00Z
17
value 0.00049
scoring_system epss
scoring_elements 0.15008
published_at 2026-05-07T12:55:00Z
18
value 0.00049
scoring_system epss
scoring_elements 0.15102
published_at 2026-05-09T12:55:00Z
19
value 0.00049
scoring_system epss
scoring_elements 0.15091
published_at 2026-05-11T12:55:00Z
20
value 0.00049
scoring_system epss
scoring_elements 0.15136
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3602
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1131680
reference_id 1131680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1131680
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3602
reference_id CVE-2014-3602
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3602
22
reference_url https://access.redhat.com/errata/RHSA-2014:1796
reference_id RHSA-2014:1796
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1796
23
reference_url https://access.redhat.com/errata/RHSA-2014:1906
reference_id RHSA-2014:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1906
fixed_packages
aliases CVE-2014-3602
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ey2-dm5w-y7a6
2
url VCID-c883-yge1-yygb
vulnerability_id VCID-c883-yge1-yygb
summary
openshift-origin-node Improper Input Validation vulnerability
Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:0487
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:0487
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0084.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0084.json
2
reference_url https://access.redhat.com/security/cve/CVE-2014-0084
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-0084
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0084
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.30791
published_at 2026-05-14T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31293
published_at 2026-04-12T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.3125
published_at 2026-04-13T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31284
published_at 2026-04-16T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31264
published_at 2026-04-18T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31237
published_at 2026-04-21T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31064
published_at 2026-04-24T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.30941
published_at 2026-04-26T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.30858
published_at 2026-04-29T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.30707
published_at 2026-05-05T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.30776
published_at 2026-05-07T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.30785
published_at 2026-05-09T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.30701
published_at 2026-05-11T12:55:00Z
13
value 0.00122
scoring_system epss
scoring_elements 0.30724
published_at 2026-05-12T12:55:00Z
14
value 0.00122
scoring_system epss
scoring_elements 0.31246
published_at 2026-04-01T12:55:00Z
15
value 0.00122
scoring_system epss
scoring_elements 0.31387
published_at 2026-04-02T12:55:00Z
16
value 0.00122
scoring_system epss
scoring_elements 0.31428
published_at 2026-04-04T12:55:00Z
17
value 0.00122
scoring_system epss
scoring_elements 0.31249
published_at 2026-04-07T12:55:00Z
18
value 0.00122
scoring_system epss
scoring_elements 0.31302
published_at 2026-04-08T12:55:00Z
19
value 0.00122
scoring_system epss
scoring_elements 0.31332
published_at 2026-04-09T12:55:00Z
20
value 0.00122
scoring_system epss
scoring_elements 0.31337
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0084
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1065198
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1065198
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0084
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0084
6
reference_url https://github.com/openshift/origin-server
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openshift/origin-server
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openshift-origin-node/CVE-2014-0084.yml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openshift-origin-node/CVE-2014-0084.yml
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0084
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-0084
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_origin:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_origin:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_origin:*:*:*:*:*:*:*:*
10
reference_url https://github.com/advisories/GHSA-756m-3qf2-hp58
reference_id GHSA-756m-3qf2-hp58
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-756m-3qf2-hp58
fixed_packages
aliases CVE-2014-0084, GHSA-756m-3qf2-hp58
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c883-yge1-yygb
3
url VCID-ebq1-gkhe-pua7
vulnerability_id VCID-ebq1-gkhe-pua7
summary
Denial of Service and SQL Injection
This package allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka.
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0686.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0686.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0701.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0701.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1028.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1028.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2013-1147.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1147.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0269.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0269.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0269
reference_id
reference_type
scores
0
value 0.15424
scoring_system epss
scoring_elements 0.94678
published_at 2026-05-05T12:55:00Z
1
value 0.15424
scoring_system epss
scoring_elements 0.94686
published_at 2026-05-07T12:55:00Z
2
value 0.15424
scoring_system epss
scoring_elements 0.94696
published_at 2026-05-09T12:55:00Z
3
value 0.15424
scoring_system epss
scoring_elements 0.94702
published_at 2026-05-11T12:55:00Z
4
value 0.15424
scoring_system epss
scoring_elements 0.94707
published_at 2026-05-12T12:55:00Z
5
value 0.15424
scoring_system epss
scoring_elements 0.9472
published_at 2026-05-14T12:55:00Z
6
value 0.15424
scoring_system epss
scoring_elements 0.94672
published_at 2026-04-29T12:55:00Z
7
value 0.17317
scoring_system epss
scoring_elements 0.95032
published_at 2026-04-08T12:55:00Z
8
value 0.17317
scoring_system epss
scoring_elements 0.95036
published_at 2026-04-09T12:55:00Z
9
value 0.17317
scoring_system epss
scoring_elements 0.95058
published_at 2026-04-26T12:55:00Z
10
value 0.17317
scoring_system epss
scoring_elements 0.95059
published_at 2026-04-24T12:55:00Z
11
value 0.17317
scoring_system epss
scoring_elements 0.95057
published_at 2026-04-18T12:55:00Z
12
value 0.17317
scoring_system epss
scoring_elements 0.95054
published_at 2026-04-16T12:55:00Z
13
value 0.17317
scoring_system epss
scoring_elements 0.95045
published_at 2026-04-13T12:55:00Z
14
value 0.17317
scoring_system epss
scoring_elements 0.95043
published_at 2026-04-12T12:55:00Z
15
value 0.17317
scoring_system epss
scoring_elements 0.95009
published_at 2026-04-01T12:55:00Z
16
value 0.17317
scoring_system epss
scoring_elements 0.95041
published_at 2026-04-11T12:55:00Z
17
value 0.17317
scoring_system epss
scoring_elements 0.9502
published_at 2026-04-02T12:55:00Z
18
value 0.17317
scoring_system epss
scoring_elements 0.95021
published_at 2026-04-04T12:55:00Z
19
value 0.17317
scoring_system epss
scoring_elements 0.95024
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0269
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0269
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0269
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
12
reference_url http://secunia.com/advisories/52075
reference_id
reference_type
scores
url http://secunia.com/advisories/52075
13
reference_url http://secunia.com/advisories/52774
reference_id
reference_type
scores
url http://secunia.com/advisories/52774
14
reference_url http://secunia.com/advisories/52902
reference_id
reference_type
scores
url http://secunia.com/advisories/52902
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/82010
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/82010
16
reference_url https://github.com/flori/json
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/flori/json
17
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2013-0269.yml
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2013-0269.yml
18
reference_url https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/4_YvCpLzL58
reference_id
reference_type
scores
url https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/4_YvCpLzL58
19
reference_url https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-0269
21
reference_url http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
reference_id
reference_type
scores
url http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
22
reference_url https://puppet.com/security/cve/cve-2013-0269
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2013-0269
23
reference_url https://web.archive.org/web/20130228082541/http://www.securityfocus.com/bid/57899
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130228082541/http://www.securityfocus.com/bid/57899
24
reference_url https://web.archive.org/web/20160331131233/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160331131233/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed
25
reference_url https://web.archive.org/web/20160808163226/https://puppet.com/security/cve/cve-2013-0269
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160808163226/https://puppet.com/security/cve/cve-2013-0269
26
reference_url http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released
27
reference_url http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
reference_id
reference_type
scores
url http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/
28
reference_url http://www.openwall.com/lists/oss-security/2013/02/11/7
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/02/11/7
29
reference_url http://www.openwall.com/lists/oss-security/2013/02/11/8
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/02/11/8
30
reference_url http://www.osvdb.org/90074
reference_id
reference_type
scores
url http://www.osvdb.org/90074
31
reference_url http://www.securityfocus.com/bid/57899
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57899
32
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862
33
reference_url http://www.ubuntu.com/usn/USN-1733-1
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1733-1
34
reference_url http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection
35
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700436
reference_id 700436
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700436
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=909029
reference_id 909029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=909029
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.5.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.6.7:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubygems:json_gem:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubygems:json_gem:1.7.6:*:*:*:*:*:*:*
57
reference_url https://github.com/advisories/GHSA-x457-cw4h-hq5f
reference_id GHSA-x457-cw4h-hq5f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x457-cw4h-hq5f
58
reference_url https://security.gentoo.org/glsa/201412-27
reference_id GLSA-201412-27
reference_type
scores
url https://security.gentoo.org/glsa/201412-27
59
reference_url https://access.redhat.com/errata/RHSA-2013:0686
reference_id RHSA-2013:0686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0686
60
reference_url https://access.redhat.com/errata/RHSA-2013:0701
reference_id RHSA-2013:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0701
61
reference_url https://access.redhat.com/errata/RHSA-2013:1028
reference_id RHSA-2013:1028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1028
62
reference_url https://access.redhat.com/errata/RHSA-2013:1147
reference_id RHSA-2013:1147
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1147
63
reference_url https://access.redhat.com/errata/RHSA-2013:1185
reference_id RHSA-2013:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1185
64
reference_url https://usn.ubuntu.com/1733-1/
reference_id USN-1733-1
reference_type
scores
url https://usn.ubuntu.com/1733-1/
fixed_packages
aliases CVE-2013-0269, GHSA-x457-cw4h-hq5f, OSV-101137
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebq1-gkhe-pua7
4
url VCID-pb4n-q6u8-syds
vulnerability_id VCID-pb4n-q6u8-syds
summary
XSS exploit of RDoc documentation generated by rdoc
This exploit may lead to cookie disclosure to third parties. The exploit exists in darkfish.js which is copied from the RDoc install location to the generated documentation. RDoc is a static documentation generation tool. Patching the library itself is insufficient to correct this exploit.
references
0
reference_url http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
reference_id
reference_type
scores
url http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0548.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0548.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0686.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0686.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0701.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0701.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0728.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0728.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0256.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0256.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0256
reference_id
reference_type
scores
0
value 0.02743
scoring_system epss
scoring_elements 0.86136
published_at 2026-05-14T12:55:00Z
1
value 0.03584
scoring_system epss
scoring_elements 0.87714
published_at 2026-04-04T12:55:00Z
2
value 0.03584
scoring_system epss
scoring_elements 0.87692
published_at 2026-04-01T12:55:00Z
3
value 0.03584
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-02T12:55:00Z
4
value 0.03584
scoring_system epss
scoring_elements 0.87716
published_at 2026-04-07T12:55:00Z
5
value 0.03584
scoring_system epss
scoring_elements 0.87738
published_at 2026-04-08T12:55:00Z
6
value 0.03584
scoring_system epss
scoring_elements 0.87744
published_at 2026-04-09T12:55:00Z
7
value 0.03584
scoring_system epss
scoring_elements 0.87755
published_at 2026-04-11T12:55:00Z
8
value 0.03584
scoring_system epss
scoring_elements 0.87749
published_at 2026-04-12T12:55:00Z
9
value 0.03584
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-13T12:55:00Z
10
value 0.03584
scoring_system epss
scoring_elements 0.87761
published_at 2026-04-16T12:55:00Z
11
value 0.03584
scoring_system epss
scoring_elements 0.8776
published_at 2026-04-18T12:55:00Z
12
value 0.03584
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-21T12:55:00Z
13
value 0.03584
scoring_system epss
scoring_elements 0.87776
published_at 2026-04-24T12:55:00Z
14
value 0.03584
scoring_system epss
scoring_elements 0.87782
published_at 2026-04-26T12:55:00Z
15
value 0.03584
scoring_system epss
scoring_elements 0.8778
published_at 2026-04-29T12:55:00Z
16
value 0.03584
scoring_system epss
scoring_elements 0.87794
published_at 2026-05-05T12:55:00Z
17
value 0.03679
scoring_system epss
scoring_elements 0.88009
published_at 2026-05-12T12:55:00Z
18
value 0.04105
scoring_system epss
scoring_elements 0.88659
published_at 2026-05-07T12:55:00Z
19
value 0.04105
scoring_system epss
scoring_elements 0.88669
published_at 2026-05-11T12:55:00Z
20
value 0.04105
scoring_system epss
scoring_elements 0.88672
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0256
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=907820
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=907820
10
reference_url http://secunia.com/advisories/52774
reference_id
reference_type
scores
url http://secunia.com/advisories/52774
11
reference_url https://github.com/advisories/GHSA-v2r9-c84j-v7xm
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-v2r9-c84j-v7xm
12
reference_url https://github.com/rdoc/rdoc
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rdoc/rdoc
13
reference_url https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
14
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0256
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-0256
16
reference_url https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
17
reference_url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256
18
reference_url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
19
reference_url http://www.ubuntu.com/usn/USN-1733-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1733-1
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
reference_id cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
37
reference_url https://github.com/rdoc/rdoc/blob/master/CVE-2013-0256.rdoc
reference_id CVE-2013-0256.RDOC
reference_type
scores
url https://github.com/rdoc/rdoc/blob/master/CVE-2013-0256.rdoc
38
reference_url https://access.redhat.com/errata/RHSA-2013:0686
reference_id RHSA-2013:0686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0686
39
reference_url https://access.redhat.com/errata/RHSA-2013:0701
reference_id RHSA-2013:0701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0701
40
reference_url https://access.redhat.com/errata/RHSA-2013:0728
reference_id RHSA-2013:0728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0728
41
reference_url https://usn.ubuntu.com/1733-1/
reference_id USN-1733-1
reference_type
scores
url https://usn.ubuntu.com/1733-1/
fixed_packages
aliases CVE-2013-0256, GHSA-v2r9-c84j-v7xm, OSV-90004
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pb4n-q6u8-syds
5
url VCID-s2ka-cp49-q3hz
vulnerability_id VCID-s2ka-cp49-q3hz
summary mcollective: default password set at install
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0175.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0175
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65094
published_at 2026-04-01T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65144
published_at 2026-04-02T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65169
published_at 2026-04-04T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65135
published_at 2026-04-07T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65185
published_at 2026-04-08T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65197
published_at 2026-04-09T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65216
published_at 2026-04-24T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65203
published_at 2026-04-21T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65175
published_at 2026-04-13T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.6521
published_at 2026-04-16T12:55:00Z
10
value 0.00483
scoring_system epss
scoring_elements 0.6522
published_at 2026-04-18T12:55:00Z
11
value 0.00483
scoring_system epss
scoring_elements 0.65229
published_at 2026-04-26T12:55:00Z
12
value 0.00483
scoring_system epss
scoring_elements 0.65228
published_at 2026-04-29T12:55:00Z
13
value 0.00483
scoring_system epss
scoring_elements 0.65208
published_at 2026-05-05T12:55:00Z
14
value 0.00483
scoring_system epss
scoring_elements 0.65255
published_at 2026-05-07T12:55:00Z
15
value 0.00483
scoring_system epss
scoring_elements 0.65301
published_at 2026-05-09T12:55:00Z
16
value 0.00483
scoring_system epss
scoring_elements 0.65269
published_at 2026-05-11T12:55:00Z
17
value 0.00483
scoring_system epss
scoring_elements 0.65291
published_at 2026-05-12T12:55:00Z
18
value 0.00483
scoring_system epss
scoring_elements 0.65347
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0175
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1086381
reference_id 1086381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1086381
fixed_packages
aliases CVE-2014-0175
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ka-cp49-q3hz
6
url VCID-vnm4-gfjh-8qa7
vulnerability_id VCID-vnm4-gfjh-8qa7
summary openshift-origin-broker: default password creation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0234.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0234
reference_id
reference_type
scores
0
value 0.08806
scoring_system epss
scoring_elements 0.92488
published_at 2026-04-01T12:55:00Z
1
value 0.08806
scoring_system epss
scoring_elements 0.92494
published_at 2026-04-02T12:55:00Z
2
value 0.08806
scoring_system epss
scoring_elements 0.92503
published_at 2026-04-04T12:55:00Z
3
value 0.08806
scoring_system epss
scoring_elements 0.92505
published_at 2026-04-07T12:55:00Z
4
value 0.08806
scoring_system epss
scoring_elements 0.92517
published_at 2026-04-08T12:55:00Z
5
value 0.08806
scoring_system epss
scoring_elements 0.92522
published_at 2026-04-09T12:55:00Z
6
value 0.08806
scoring_system epss
scoring_elements 0.92528
published_at 2026-04-13T12:55:00Z
7
value 0.08806
scoring_system epss
scoring_elements 0.92529
published_at 2026-04-12T12:55:00Z
8
value 0.08806
scoring_system epss
scoring_elements 0.92539
published_at 2026-04-18T12:55:00Z
9
value 0.08806
scoring_system epss
scoring_elements 0.92542
published_at 2026-04-21T12:55:00Z
10
value 0.08806
scoring_system epss
scoring_elements 0.92543
published_at 2026-04-24T12:55:00Z
11
value 0.08806
scoring_system epss
scoring_elements 0.92544
published_at 2026-04-26T12:55:00Z
12
value 0.08806
scoring_system epss
scoring_elements 0.92541
published_at 2026-04-29T12:55:00Z
13
value 0.08806
scoring_system epss
scoring_elements 0.9255
published_at 2026-05-05T12:55:00Z
14
value 0.08806
scoring_system epss
scoring_elements 0.92561
published_at 2026-05-07T12:55:00Z
15
value 0.08806
scoring_system epss
scoring_elements 0.92571
published_at 2026-05-09T12:55:00Z
16
value 0.08806
scoring_system epss
scoring_elements 0.92575
published_at 2026-05-11T12:55:00Z
17
value 0.08806
scoring_system epss
scoring_elements 0.92581
published_at 2026-05-12T12:55:00Z
18
value 0.08806
scoring_system epss
scoring_elements 0.92606
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0234
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1097008
reference_id 1097008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1097008
fixed_packages
aliases CVE-2014-0234
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vnm4-gfjh-8qa7
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-json@1.7.3-2%3Farch=el6op