{"url":"http://public2.vulnerablecode.io/api/packages/36384?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.0.0","type":"maven","namespace":"org.apache.camel","name":"camel-core","version":"2.0.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.24.0","latest_non_vulnerable_version":"4.4.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4624?format=json","vulnerability_id":"VCID-423h-njb8-3uam","summary":"Apache Camel before 2.9.7, 2.10.0 before 2.10.7, 2.11.0 before 2.11.2, and 2.12.0 allows remote attackers to execute arbitrary simple language expressions by including \"$simple{}\" in a CamelFileName message header to a (1) FILE or (2) FTP producer.","references":[{"reference_url":"http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc?version=1&modificationDate=1380535446943"},{"reference_url":"http://packetstormsecurity.com/files/123454","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://packetstormsecurity.com/files/123454"},{"reference_url":"http://packetstormsecurity.com/files/123454/","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/123454/"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1862.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1862.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0124.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0124.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0140.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0140.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0245.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0245.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0254.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0254.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4330.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4330.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4330","reference_id":"","reference_type":"","scores":[{"value":"0.18012","scoring_system":"epss","scoring_elements":"0.95179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18012","scoring_system":"epss","scoring_elements":"0.95178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.9584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95862","published_at":"2026-04-18T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.22558","scoring_system":"epss","scoring_elements":"0.95845","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4330"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4330","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4330"},{"reference_url":"http://seclists.org/fulldisclosure/2013/Sep/178","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2013/Sep/178"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/87542","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/87542"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/commit/2281b1f365c50ee1a470fb9990b753eadee9095","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/2281b1f365c50ee1a470fb9990b753eadee9095"},{"reference_url":"https://github.com/apache/camel/commit/27a9752a565fbef436bac4fcf22d339e3295b2a","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/27a9752a565fbef436bac4fcf22d339e3295b2a"},{"reference_url":"https://github.com/apache/camel/commit/3215fe50dd42c83a7a454dd36486843fe36eae4","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/3215fe50dd42c83a7a454dd36486843fe36eae4"},{"reference_url":"https://github.com/apache/camel/commit/5ba8f63f78f82b0cddf6cecbf59ac444a0cae2a6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/5ba8f63f78f82b0cddf6cecbf59ac444a0cae2a6"},{"reference_url":"https://github.com/apache/camel/commit/ce19353f1297c5d3dc59be21a1ead89c0a44907","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/ce19353f1297c5d3dc59be21a1ead89c0a44907"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-6734","reference_id":"","reference_type":"","scores":[],"url":"https://issues.apache.org/jira/browse/CAMEL-6734"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-6748","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-6748"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4330","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4330"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1011726","reference_id":"1011726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1011726"},{"reference_url":"http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc","reference_id":"CVE-2013-4330.TXT.ASC","reference_type":"","scores":[],"url":"http://camel.apache.org/security-advisories.data/CVE-2013-4330.txt.asc"},{"reference_url":"https://github.com/advisories/GHSA-x9fv-c87w-55wc","reference_id":"GHSA-x9fv-c87w-55wc","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-x9fv-c87w-55wc"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1410","reference_id":"RHSA-2013:1410","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1862","reference_id":"RHSA-2013:1862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0124","reference_id":"RHSA-2014:0124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0140","reference_id":"RHSA-2014:0140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0245","reference_id":"RHSA-2014:0245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0254","reference_id":"RHSA-2014:0254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0254"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/20437?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.9.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-423h-njb8-3uam"},{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-k4un-d8uk-ryhe"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"},{"vulnerability":"VCID-uwkp-1etw-kkag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.9.7"},{"url":"http://public2.vulnerablecode.io/api/packages/20446?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.9.8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-k4un-d8uk-ryhe"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"},{"vulnerability":"VCID-uwkp-1etw-kkag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.9.8"},{"url":"http://public2.vulnerablecode.io/api/packages/20443?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.10.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-k4un-d8uk-ryhe"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"},{"vulnerability":"VCID-uwkp-1etw-kkag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.10.7"},{"url":"http://public2.vulnerablecode.io/api/packages/20444?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.11.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-k4un-d8uk-ryhe"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"},{"vulnerability":"VCID-uwkp-1etw-kkag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.11.2"},{"url":"http://public2.vulnerablecode.io/api/packages/20445?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.12.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-k4un-d8uk-ryhe"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"},{"vulnerability":"VCID-uwkp-1etw-kkag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.12.1"}],"aliases":["CVE-2013-4330","GHSA-x9fv-c87w-55wc"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-423h-njb8-3uam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/10615?format=json","vulnerability_id":"VCID-579q-qqj8-63gs","summary":"Path Traversal\nApache Camel's File is vulnerable to directory traversal.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0194.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0194.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-0194","reference_id":"","reference_type":"","scores":[{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.8507","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85062","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.8504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85038","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.8502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.84955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.84941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85022","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.85006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.84999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.84976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02389","scoring_system":"epss","scoring_elements":"0.84972","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-0194"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/pull/2700","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/pull/2700"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-13042","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-13042"},{"reference_url":"https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/04/30/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2019/04/30/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707581","reference_id":"1707581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707581"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0194","reference_id":"CVE-2019-0194","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0194"},{"reference_url":"https://github.com/advisories/GHSA-4wjq-69rc-8wcp","reference_id":"GHSA-4wjq-69rc-8wcp","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-4wjq-69rc-8wcp"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/36388?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.19.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.19.1"},{"url":"http://public2.vulnerablecode.io/api/packages/36389?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.21.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.21.4"},{"url":"http://public2.vulnerablecode.io/api/packages/79266?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.21.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.21.5"},{"url":"http://public2.vulnerablecode.io/api/packages/36390?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.22.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.22.3"},{"url":"http://public2.vulnerablecode.io/api/packages/36391?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.23.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.23.1"}],"aliases":["CVE-2019-0194","GHSA-4wjq-69rc-8wcp"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-579q-qqj8-63gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4635?format=json","vulnerability_id":"VCID-aard-mgx9-rff2","summary":"XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource.","references":[{"reference_url":"http://camel.apache.org/security-advisories.html","reference_id":"","reference_type":"","scores":[],"url":"http://camel.apache.org/security-advisories.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1041.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1041.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1538.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1538.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1539.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1539.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0263.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0263.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0263","reference_id":"","reference_type":"","scores":[{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85564","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85563","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.8554","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85597","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85468","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0257","scoring_system":"epss","scoring_elements":"0.85481","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0263"},{"reference_url":"https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc"},{"reference_url":"https://github.com/advisories/GHSA-3hrc-f439-727g","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-3hrc-f439-727g"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/commit/06db9e0744f2bb9f6e3bf16c0dfe7099a3481558","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/06db9e0744f2bb9f6e3bf16c0dfe7099a3481558"},{"reference_url":"https://github.com/apache/camel/commit/367d53e73c8b5a1e73c24423e631709f9a96e08d","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/367d53e73c8b5a1e73c24423e631709f9a96e08d"},{"reference_url":"https://github.com/apache/camel/commit/7d19340bcdb42f7aae584d9c5003ac4f7ddaee36","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/7d19340bcdb42f7aae584d9c5003ac4f7ddaee36"},{"reference_url":"https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-8312","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-8312"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0263","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0263"},{"reference_url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0263","reference_id":"","reference_type":"","scores":[],"url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0263"},{"reference_url":"http://www.securitytracker.com/id/1032442","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securitytracker.com/id/1032442"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1203344","reference_id":"1203344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1203344"},{"reference_url":"http://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc?version=1&modificationDate=1426539178000&api=v2","reference_id":"CVE-2015-0263.TXT.ASC?VERSION=1&MODIFICATIONDATE=1426539178000&API=V2","reference_type":"","scores":[],"url":"http://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc?version=1&modificationDate=1426539178000&api=v2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1041","reference_id":"RHSA-2015:1041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1538","reference_id":"RHSA-2015:1538","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1538"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1539","reference_id":"RHSA-2015:1539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2558","reference_id":"RHSA-2015:2558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2558"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21140?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.13.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.13.4"},{"url":"http://public2.vulnerablecode.io/api/packages/21141?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.14.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.14.2"}],"aliases":["CVE-2015-0263","GHSA-3hrc-f439-727g"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aard-mgx9-rff2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4577?format=json","vulnerability_id":"VCID-et64-wksj-qyhj","summary":"Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.","references":[{"reference_url":"http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1832","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:1832"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5643.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5643","reference_id":"","reference_type":"","scores":[{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.8036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.8038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80369","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80436","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01398","scoring_system":"epss","scoring_elements":"0.80472","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5643"},{"reference_url":"https://github.com/advisories/GHSA-vq9j-jh62-5hmp","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-vq9j-jh62-5hmp"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3b"},{"reference_url":"https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3be","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3be"},{"reference_url":"https://github.com/apache/camel/commit/87c92b7b38890c217bc76f2c55036e6a5cca9a0","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/commit/87c92b7b38890c217bc76f2c55036e6a5cca9a0"},{"reference_url":"https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046d","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046d"},{"reference_url":"https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046da","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046da"},{"reference_url":"https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5"},{"reference_url":"https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5b","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5b"},{"reference_url":"https://github.com/apache/camel/commit/ec3d0db81ba061b27e934d5ff56e9baca0049eb","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/commit/ec3d0db81ba061b27e934d5ff56e9baca0049eb"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-10894","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-10894"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5643","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5643"},{"reference_url":"http://www.securityfocus.com/bid/97226","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/97226"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1433374","reference_id":"1433374","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1433374"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.17.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:camel:2.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://www.cvedetails.com/cve/CVE-2017-5643/","reference_id":"CVE-2017-5643","reference_type":"","scores":[],"url":"https://www.cvedetails.com/cve/CVE-2017-5643/"},{"reference_url":"https://camel.apache.org/security-advisories.data/CVE-2017-5643.txt","reference_id":"CVE-2017-5643.TXT","reference_type":"","scores":[],"url":"https://camel.apache.org/security-advisories.data/CVE-2017-5643.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/23962?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.17.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.17.6"},{"url":"http://public2.vulnerablecode.io/api/packages/23961?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.18.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.18.2"},{"url":"http://public2.vulnerablecode.io/api/packages/23963?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.18.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.18.3"},{"url":"http://public2.vulnerablecode.io/api/packages/23964?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.19.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.19.0"}],"aliases":["CVE-2017-5643","GHSA-vq9j-jh62-5hmp"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-et64-wksj-qyhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4541?format=json","vulnerability_id":"VCID-k4un-d8uk-ryhe","summary":"The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.","references":[{"reference_url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0003","reference_id":"","reference_type":"","scores":[],"url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0003"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0245.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0245.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0254.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0254.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0371.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0371.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0372.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0372.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0003.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0003","reference_id":"","reference_type":"","scores":[{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95878","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95907","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95913","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23043","scoring_system":"epss","scoring_elements":"0.95933","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0003"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/commit/483b445dc77487e2d0f3d8c8bf1a7bbab04464c","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/483b445dc77487e2d0f3d8c8bf1a7bbab04464c"},{"reference_url":"https://github.com/apache/camel/commit/c6de749e9b3c7b61861c5480e91550290585224","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/c6de749e9b3c7b61861c5480e91550290585224"},{"reference_url":"https://github.com/apache/camel/commit/e922f89290f236f3107039de61af0375826bd96d","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/e922f89290f236f3107039de61af0375826bd96d"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-7123","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-7123"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0003","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0003"},{"reference_url":"https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65902","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65902"},{"reference_url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0003","reference_id":"","reference_type":"","scores":[],"url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0003"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1049692","reference_id":"1049692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1049692"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2014-0003","reference_id":"CVE-2014-0003","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/CVE-2014-0003"},{"reference_url":"http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc","reference_id":"CVE-2014-0003.TXT.ASC","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc"},{"reference_url":"https://github.com/advisories/GHSA-h6rp-8v4j-hwph","reference_id":"GHSA-h6rp-8v4j-hwph","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-h6rp-8v4j-hwph"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0245","reference_id":"RHSA-2014:0245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0254","reference_id":"RHSA-2014:0254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0323","reference_id":"RHSA-2014:0323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0452","reference_id":"RHSA-2014:0452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0459","reference_id":"RHSA-2014:0459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0459"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/20604?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.11.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.11.4"},{"url":"http://public2.vulnerablecode.io/api/packages/20605?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.12.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.12.3"}],"aliases":["CVE-2014-0003","GHSA-h6rp-8v4j-hwph"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4un-d8uk-ryhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4698?format=json","vulnerability_id":"VCID-m8hb-4rwu-jkcy","summary":"Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query.","references":[{"reference_url":"http://camel.apache.org/security-advisories.html","reference_id":"","reference_type":"","scores":[],"url":"http://camel.apache.org/security-advisories.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1041.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1041.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1538.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1538.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1539.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1539.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0264.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0264","reference_id":"","reference_type":"","scores":[{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83793","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83738","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02016","scoring_system":"epss","scoring_elements":"0.83682","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0264"},{"reference_url":"https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc"},{"reference_url":"http://securitytracker.com/id/1032442","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://securitytracker.com/id/1032442"},{"reference_url":"https://github.com/advisories/GHSA-mhx2-r3jx-g94c","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-mhx2-r3jx-g94c"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/commit/1df559649a96a1ca0368373387e542f46e4820da","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/commit/1df559649a96a1ca0368373387e542f46e4820da"},{"reference_url":"https://github.com/apache/camel/commit/7360aada5154434c68774aa30e0f21ddc5f27b9f","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/7360aada5154434c68774aa30e0f21ddc5f27b9f"},{"reference_url":"https://github.com/apache/camel/commit/b47b51a195b38e7ab7c099d19910af70a16638f6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/b47b51a195b38e7ab7c099d19910af70a16638f6"},{"reference_url":"https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-8312","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-8312"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0264","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0264"},{"reference_url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0264","reference_id":"","reference_type":"","scores":[],"url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0264"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1203341","reference_id":"1203341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1203341"},{"reference_url":"https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc?version=1&modificationDate=1426539191000&api=v2","reference_id":"CVE-2015-0264.TXT.ASC?VERSION=1&MODIFICATIONDATE=1426539191000&API=V2","reference_type":"","scores":[],"url":"https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc?version=1&modificationDate=1426539191000&api=v2"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1041","reference_id":"RHSA-2015:1041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1538","reference_id":"RHSA-2015:1538","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1538"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1539","reference_id":"RHSA-2015:1539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2558","reference_id":"RHSA-2015:2558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2558"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21140?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.13.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.13.4"},{"url":"http://public2.vulnerablecode.io/api/packages/21141?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.14.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.14.2"}],"aliases":["CVE-2015-0264","GHSA-mhx2-r3jx-g94c"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m8hb-4rwu-jkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/10683?format=json","vulnerability_id":"VCID-n8rf-enh6-q3bq","summary":"Apache Camel contains an XML external entity injection vulnerability due to using an outdated vulnerable JSON-lib library. This affects only the `camel-xmljson` component, which was removed.","references":[{"reference_url":"http://jvn.jp/en/jp/JVN71498764/index.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://jvn.jp/en/jp/JVN71498764/index.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0188.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0188.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-0188","reference_id":"","reference_type":"","scores":[{"value":"0.00961","scoring_system":"epss","scoring_elements":"0.76575","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79855","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79911","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.7989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79954","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-0188"},{"reference_url":"https://github.com/apache/camel/releases/tag/camel-2.24.0","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/camel/releases/tag/camel-2.24.0"},{"reference_url":"https://issues.apache.org/jira/browse/TAMAYA-410","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/TAMAYA-410"},{"reference_url":"https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E"},{"reference_url":"https://www.openwall.com/lists/oss-security/2019/05/24/1","reference_id":"","reference_type":"","scores":[],"url":"https://www.openwall.com/lists/oss-security/2019/05/24/1"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2021.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"https://www.securityfocus.com/bid/108422/info","reference_id":"","reference_type":"","scores":[],"url":"https://www.securityfocus.com/bid/108422/info"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/05/24/2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2019/05/24/2"},{"reference_url":"http://www.securityfocus.com/bid/108422","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/108422"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719519","reference_id":"1719519","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719519"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0188","reference_id":"CVE-2019-0188","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0188"},{"reference_url":"https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc","reference_id":"CVE-2019-0188.TXT.ASC","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc"},{"reference_url":"https://github.com/advisories/GHSA-h896-mx9x-g32g","reference_id":"GHSA-h896-mx9x-g32g","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-h896-mx9x-g32g"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/36881?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.24.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.24.0"}],"aliases":["CVE-2019-0188","GHSA-h896-mx9x-g32g"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n8rf-enh6-q3bq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4901?format=json","vulnerability_id":"VCID-uwkp-1etw-kkag","summary":"The XSLT component in Apache Camel before 2.11.4 and 2.12.x before 2.12.3 allows remote attackers to read arbitrary files and possibly have other unspecified impact via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.","references":[{"reference_url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0002","reference_id":"","reference_type":"","scores":[],"url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0002"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0371.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0371.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0372.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0372.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0002.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0002","reference_id":"","reference_type":"","scores":[{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.9656","published_at":"2026-04-29T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.9651","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.9652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.9655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96556","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28739","scoring_system":"epss","scoring_elements":"0.96559","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0002"},{"reference_url":"https://github.com/apache/camel","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel"},{"reference_url":"https://github.com/apache/camel/commit/2ec54fa0c13ae65bdcccff764af081a79fcc05f","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/2ec54fa0c13ae65bdcccff764af081a79fcc05f"},{"reference_url":"https://github.com/apache/camel/commit/341d4e6cca71c53c90962d1c3d45fc9e05cc50c6","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/341d4e6cca71c53c90962d1c3d45fc9e05cc50c6"},{"reference_url":"https://github.com/apache/camel/commit/54b65c1d30848835f26bd138c0ba407bc1e560d","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/camel/commit/54b65c1d30848835f26bd138c0ba407bc1e560d"},{"reference_url":"https://issues.apache.org/jira/browse/CAMEL-7129","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/CAMEL-7129"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0002","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0002"},{"reference_url":"https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65901","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200229061309/http://www.securityfocus.com/bid/65901"},{"reference_url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0002","reference_id":"","reference_type":"","scores":[],"url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1049675","reference_id":"1049675","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1049675"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2014-0002","reference_id":"CVE-2014-0002","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/CVE-2014-0002"},{"reference_url":"http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc","reference_id":"CVE-2014-0002.TXT.ASC","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc"},{"reference_url":"https://github.com/advisories/GHSA-2fw5-rvf2-jq56","reference_id":"GHSA-2fw5-rvf2-jq56","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2fw5-rvf2-jq56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0323","reference_id":"RHSA-2014:0323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0452","reference_id":"RHSA-2014:0452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0459","reference_id":"RHSA-2014:0459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0459"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/20604?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.11.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.11.4"},{"url":"http://public2.vulnerablecode.io/api/packages/20605?format=json","purl":"pkg:maven/org.apache.camel/camel-core@2.12.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-579q-qqj8-63gs"},{"vulnerability":"VCID-aard-mgx9-rff2"},{"vulnerability":"VCID-et64-wksj-qyhj"},{"vulnerability":"VCID-m8hb-4rwu-jkcy"},{"vulnerability":"VCID-n8rf-enh6-q3bq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.12.3"}],"aliases":["CVE-2014-0002","GHSA-2fw5-rvf2-jq56"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uwkp-1etw-kkag"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.0.0"}