Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127322?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127322?format=api", "purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6?arch=1", "type": "rpm", "namespace": "redhat", "name": "ruby", "version": "1.8.5-19.el5_6", "qualifiers": { "arch": "1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87786?format=api", "vulnerability_id": "VCID-9ukz-9357-aqb6", "summary": "Ruby WEBrick javascript injection flaw", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82501", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82315", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82329", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82342", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82395", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82391", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.8242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82421", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82447", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82457", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82461", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01718", "scoring_system": "epss", "scoring_elements": "0.82481", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0541" }, { "reference_url": "http://secunia.com/advisories/40220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40220" }, { "reference_url": "https://support.apple.com/en-us/HT4188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/en-us/HT4188" }, { "reference_url": "http://support.apple.com/kb/HT4188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4188" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html" }, { "reference_url": "http://www.securityfocus.com/bid/40871", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40871" }, { "reference_url": "http://www.securityfocus.com/bid/40895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40895" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1481" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731", "reference_id": "587731", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541", "reference_id": "CVE-2010-0541", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0908", "reference_id": "RHSA-2011:0908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0909", "reference_id": "RHSA-2011:0909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0909" }, { "reference_url": "https://usn.ubuntu.com/1377-1/", "reference_id": "USN-1377-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1377-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0541", "GHSA-h9r2-943c-qg8v", "OSV-65556" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ukz-9357-aqb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8434?format=api", "vulnerability_id": "VCID-bv9s-j5yk-m3aw", "summary": "WEBrick Improper Input Validation vulnerability\nWEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4492.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95142", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95086", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95087", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95096", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95099", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95105", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.9511", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95118", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95123", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95124", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95125", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95136", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.17685", "scoring_system": "epss", "scoring_elements": "0.95076", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4492" }, { "reference_url": "https://github.com/ruby/webrick", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ruby/webrick" }, { "reference_url": "https://web.archive.org/web/20100113155532/http://www.vupen.com/english/advisories/2010/0089", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20100113155532/http://www.vupen.com/english/advisories/2010/0089" }, { "reference_url": "https://web.archive.org/web/20100815010948/http://secunia.com/advisories/37949", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20100815010948/http://secunia.com/advisories/37949" }, { "reference_url": "https://web.archive.org/web/20170402100552/http://securitytracker.com/id?1023429", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20170402100552/http://securitytracker.com/id?1023429" }, { "reference_url": "https://web.archive.org/web/20170908140655/http://www.securityfocus.com/archive/1/508830/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20170908140655/http://www.securityfocus.com/archive/1/508830/100/0/threaded" }, { "reference_url": "https://web.archive.org/web/20200228145937/http://www.securityfocus.com/bid/37710", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20200228145937/http://www.securityfocus.com/bid/37710" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html" }, { "reference_url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection" }, { "reference_url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485", "reference_id": "554485", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492", "reference_id": "CVE-2009-4492", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33489.txt", "reference_id": "CVE-2009-4492;OSVDB-61774", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33489.txt" }, { "reference_url": "https://www.securityfocus.com/bid/37710/info", "reference_id": "CVE-2009-4492;OSVDB-61774", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/37710/info" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webrick/CVE-2009-4492.yml", "reference_id": "CVE-2009-4492.YML", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webrick/CVE-2009-4492.yml" }, { "reference_url": "https://github.com/advisories/GHSA-6mq2-37j5-w6r6", "reference_id": "GHSA-6mq2-37j5-w6r6", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-6mq2-37j5-w6r6" }, { "reference_url": "https://security.gentoo.org/glsa/201001-09", "reference_id": "GLSA-201001-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201001-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0908", "reference_id": "RHSA-2011:0908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0909", "reference_id": "RHSA-2011:0909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0909" }, { "reference_url": "https://usn.ubuntu.com/900-1/", "reference_id": "USN-900-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/900-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-4492", "GHSA-6mq2-37j5-w6r6", "OSV-61774" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bv9s-j5yk-m3aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62210?format=api", "vulnerability_id": "VCID-nxub-6qsu-hbhk", "summary": "Multiple vulnerabilities have been found in Ruby, allowing\n context-dependent attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0188.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83524", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83445", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83469", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83476", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83479", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01937", "scoring_system": "epss", "scoring_elements": "0.83503", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85591", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.85627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02608", "scoring_system": "epss", "scoring_elements": "0.8564", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0188" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188" }, { "reference_url": "http://support.apple.com/kb/HT4581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4581" }, { "reference_url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364&r2=30993", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364&r2=30993" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html" }, { "reference_url": "http://www.securitytracker.com/id?1025236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1025236" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332", "reference_id": "682332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://security.gentoo.org/glsa/201412-27", "reference_id": "GLSA-201412-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0908", "reference_id": "RHSA-2011:0908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0909", "reference_id": "RHSA-2011:0909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0910", "reference_id": "RHSA-2011:0910", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0910" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7305", "reference_id": "RHSA-2026:7305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7307", "reference_id": "RHSA-2026:7307", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7307" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8838", "reference_id": "RHSA-2026:8838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8838" }, { "reference_url": "https://usn.ubuntu.com/1377-1/", "reference_id": "USN-1377-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1377-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-0188", "GHSA-6vch-6cgr-x9c3" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxub-6qsu-hbhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62211?format=api", "vulnerability_id": "VCID-rh8q-s45v-xbhg", "summary": "Multiple vulnerabilities have been found in Ruby, allowing\n context-dependent attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html" }, { "reference_url": "http://osvdb.org/70958", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/70958" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1004.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1004.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1004", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13229", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13495", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13536", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13586", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13558", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1352", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13385", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13383", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13456", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13461", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13432", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13327", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1004" }, { "reference_url": "http://secunia.com/advisories/43434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43434" }, { "reference_url": "http://secunia.com/advisories/43573", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43573" }, { "reference_url": "http://support.apple.com/kb/HT5281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT5281" }, { "reference_url": "https://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/21/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/21/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/21/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/21/5" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html" }, { "reference_url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/" }, { "reference_url": "http://www.securityfocus.com/bid/46460", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46460" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0539", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0539" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913", "reference_id": "678913", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:dev:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.9.3:dev:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:dev:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004", "reference_id": "CVE-2011-1004", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004" }, { "reference_url": "https://security.gentoo.org/glsa/201412-27", "reference_id": "GLSA-201412-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0909", "reference_id": "RHSA-2011:0909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0910", "reference_id": "RHSA-2011:0910", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0910" }, { "reference_url": "https://usn.ubuntu.com/1377-1/", "reference_id": "USN-1377-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1377-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1004", "GHSA-45wv-gc6w-fq7m", "OSV-70958" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rh8q-s45v-xbhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62212?format=api", "vulnerability_id": "VCID-t1p6-1u4n-gybf", "summary": "Multiple vulnerabilities have been found in Ruby, allowing\n context-dependent attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html" }, { "reference_url": "http://osvdb.org/70957", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/70957" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1005.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1005.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1005", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84254", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84107", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.8413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84166", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84196", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84203", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84209", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02121", "scoring_system": "epss", "scoring_elements": "0.84228", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1005" }, { "reference_url": "http://secunia.com/advisories/43420", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43420" }, { "reference_url": "http://secunia.com/advisories/43573", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43573" }, { "reference_url": "http://support.apple.com/kb/HT5281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT5281" }, { "reference_url": "https://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/21/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/21/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/02/21/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/02/21/5" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html" }, { "reference_url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/" }, { "reference_url": "http://www.securityfocus.com/bid/46458", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/46458" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0539", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0539" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920", "reference_id": "678920", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005", "reference_id": "CVE-2011-1005", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005" }, { "reference_url": "https://security.gentoo.org/glsa/201412-27", "reference_id": "GLSA-201412-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0908", "reference_id": "RHSA-2011:0908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0909", "reference_id": "RHSA-2011:0909", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0909" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0910", "reference_id": "RHSA-2011:0910", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0910" }, { "reference_url": "https://usn.ubuntu.com/1377-1/", "reference_id": "USN-1377-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1377-1/" }, { "reference_url": "https://usn.ubuntu.com/1583-1/", "reference_id": "USN-1583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1583-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-1005", "GHSA-h2rc-3ppq-6pjg", "OSV-70957" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t1p6-1u4n-gybf" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.5-19.el5_6%3Farch=1" }