{"url":"http://public2.vulnerablecode.io/api/packages/84055?format=json","purl":"pkg:gem/rubygems-update@1.8.27","type":"gem","namespace":"","name":"rubygems-update","version":"1.8.27","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"3.0.3","latest_non_vulnerable_version":"3.0.3","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8117?format=json","vulnerability_id":"VCID-b36p-re17-n7dq","summary":"Improper Input Validation\nRubyGems is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.","references":[{"reference_url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3485","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:3485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0378","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0583","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0585","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0585"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0900.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0900","reference_id":"","reference_type":"","scores":[{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.9354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93507","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93527","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93539","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11232","scoring_system":"epss","scoring_elements":"0.93542","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0900"},{"reference_url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":""}],"url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251"},{"reference_url":"https://hackerone.com/reports/243003","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://hackerone.com/reports/243003"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"},{"reference_url":"https://web.archive.org/web/20190212090616/http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20190212090616/http://www.securitytracker.com/id/1039249"},{"reference_url":"https://web.archive.org/web/20200227143907/http://www.securityfocus.com/bid/100579","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200227143907/http://www.securityfocus.com/bid/100579"},{"reference_url":"https://www.debian.org/security/2017/dsa-3966","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2017/dsa-3966"},{"reference_url":"http://www.securityfocus.com/bid/100579","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100579"},{"reference_url":"http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487588","reference_id":"1487588","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487588"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0900","reference_id":"CVE-2017-0900","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0900"},{"reference_url":"https://github.com/advisories/GHSA-p7f2-rr42-m9xm","reference_id":"GHSA-p7f2-rr42-m9xm","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-p7f2-rr42-m9xm"},{"reference_url":"https://security.gentoo.org/glsa/201710-01","reference_id":"GLSA-201710-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201710-01"},{"reference_url":"https://usn.ubuntu.com/3439-1/","reference_id":"USN-3439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3439-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/24624?format=json","purl":"pkg:gem/rubygems-update@2.6.13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-f7x5-hz5f-hyd3"},{"vulnerability":"VCID-ha3g-uyse-wybx"},{"vulnerability":"VCID-jkwe-c323-3yez"},{"vulnerability":"VCID-ky5r-bch5-m7dv"},{"vulnerability":"VCID-xgmc-a5rk-zqag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13"}],"aliases":["CVE-2017-0900","GHSA-p7f2-rr42-m9xm"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b36p-re17-n7dq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7123?format=json","vulnerability_id":"VCID-ee8m-jtmh-dfbs","summary":"7PK - Security Features\nRubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a \"DNS hijack attack.\"","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1657.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1657.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3900.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3900","reference_id":"","reference_type":"","scores":[{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.8509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85113","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.84993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85007","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02401","scoring_system":"epss","scoring_elements":"0.85024","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3900"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-3900.yml","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-3900.yml"},{"reference_url":"https://web.archive.org/web/20170331091241/https://puppet.com/security/cve/CVE-2015-3900","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170331091241/https://puppet.com/security/cve/CVE-2015-3900"},{"reference_url":"https://web.archive.org/web/20200228055155/http://www.securityfocus.com/bid/75482","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200228055155/http://www.securityfocus.com/bid/75482"},{"reference_url":"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356"},{"reference_url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900"},{"reference_url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/","reference_id":"","reference_type":"","scores":[],"url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/06/26/2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2015/06/26/2"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.securityfocus.com/bid/75482","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/75482"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236116","reference_id":"1236116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1236116"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3900","reference_id":"CVE-2015-3900","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3900"},{"reference_url":"https://puppet.com/security/cve/CVE-2015-3900","reference_id":"CVE-2015-3900","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://puppet.com/security/cve/CVE-2015-3900"},{"reference_url":"http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html","reference_id":"CVE-2015-3900.HTML","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html"},{"reference_url":"https://github.com/advisories/GHSA-wp3j-rvfp-624h","reference_id":"GHSA-wp3j-rvfp-624h","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-wp3j-rvfp-624h"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1657","reference_id":"RHSA-2015:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1657"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82746?format=json","purl":"pkg:gem/rubygems-update@2.0.16","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.16"},{"url":"http://public2.vulnerablecode.io/api/packages/132456?format=json","purl":"pkg:gem/rubygems-update@2.1.0.rc.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0.rc.1"},{"url":"http://public2.vulnerablecode.io/api/packages/82747?format=json","purl":"pkg:gem/rubygems-update@2.2.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.2.4"},{"url":"http://public2.vulnerablecode.io/api/packages/21150?format=json","purl":"pkg:gem/rubygems-update@2.4.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8d7n-bfhu-dkfd"},{"vulnerability":"VCID-8hm4-c4w4-gfen"},{"vulnerability":"VCID-9t45-d5mf-3uar"},{"vulnerability":"VCID-af1f-xwwy-jfa8"},{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-mamm-cvdr-subf"},{"vulnerability":"VCID-tq93-h2ag-s3bx"},{"vulnerability":"VCID-w4ns-f42m-pyec"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.4.7"}],"aliases":["CVE-2015-3900","GHSA-wp3j-rvfp-624h","OSV-122162"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ee8m-jtmh-dfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8116?format=json","vulnerability_id":"VCID-jmzh-89dm-r7g2","summary":"Origin Validation Error\nRubyGems is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.","references":[{"reference_url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3485","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:3485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0378","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0583","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0585","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0585"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0902.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0902.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0902","reference_id":"","reference_type":"","scores":[{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89894","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.8991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89945","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.8995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05207","scoring_system":"epss","scoring_elements":"0.89962","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0902"},{"reference_url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":""}],"url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32"},{"reference_url":"https://hackerone.com/reports/218088","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://hackerone.com/reports/218088"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"},{"reference_url":"https://usn.ubuntu.com/3553-1","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3553-1"},{"reference_url":"https://usn.ubuntu.com/3553-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3553-1/"},{"reference_url":"https://usn.ubuntu.com/3685-1","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3685-1"},{"reference_url":"https://usn.ubuntu.com/3685-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3685-1/"},{"reference_url":"https://web.archive.org/web/20170907040741/http://www.securityfocus.com/bid/100586","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170907040741/http://www.securityfocus.com/bid/100586"},{"reference_url":"https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249"},{"reference_url":"https://www.debian.org/security/2017/dsa-3966","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2017/dsa-3966"},{"reference_url":"http://www.securityfocus.com/bid/100586","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100586"},{"reference_url":"http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487589","reference_id":"1487589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487589"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0902","reference_id":"CVE-2017-0902","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0902"},{"reference_url":"https://github.com/advisories/GHSA-73w7-6w9g-gc8w","reference_id":"GHSA-73w7-6w9g-gc8w","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-73w7-6w9g-gc8w"},{"reference_url":"https://security.gentoo.org/glsa/201710-01","reference_id":"GLSA-201710-01","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201710-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/24624?format=json","purl":"pkg:gem/rubygems-update@2.6.13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-f7x5-hz5f-hyd3"},{"vulnerability":"VCID-ha3g-uyse-wybx"},{"vulnerability":"VCID-jkwe-c323-3yez"},{"vulnerability":"VCID-ky5r-bch5-m7dv"},{"vulnerability":"VCID-xgmc-a5rk-zqag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13"}],"aliases":["CVE-2017-0902","GHSA-73w7-6w9g-gc8w"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmzh-89dm-r7g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6862?format=json","vulnerability_id":"VCID-k2ga-fgvp-5qc7","summary":"Cryptographic Issues\nAlgorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1427.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1427.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1441.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1441.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1523.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1523.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1852.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1852.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0207.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0207.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4287.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4287","reference_id":"","reference_type":"","scores":[{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83726","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83733","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83773","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83673","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.83686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02017","scoring_system":"epss","scoring_elements":"0.837","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287"},{"reference_url":"http://secunia.com/advisories/55381","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55381"},{"reference_url":"https://github.com/rubygems/rubygems/blob/03a074e8838683f45611b119fd8f363aa44fe2fd/CHANGELOG.md","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/blob/03a074e8838683f45611b119fd8f363aa44fe2fd/CHANGELOG.md"},{"reference_url":"https://github.com/rubygems/rubygems/commit/938a7e31ac73655845ab9045629ff3f580a125da","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/938a7e31ac73655845ab9045629ff3f580a125da"},{"reference_url":"https://github.com/rubygems/rubygems/commit/b697536f2455e8c8853cf5cf8a1017a36031ed67","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/b697536f2455e8c8853cf5cf8a1017a36031ed67"},{"reference_url":"https://github.com/rubygems/rubygems/commit/b9baec03145aed684d1cd3c87dcac3cc06becd9b","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/b9baec03145aed684d1cd3c87dcac3cc06becd9b"},{"reference_url":"https://github.com/rubygems/rubygems/commit/ed733bc379d75620f5be4213f89d1d7b38be3191","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/ed733bc379d75620f5be4213f89d1d7b38be3191"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4287.yml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4287.yml"},{"reference_url":"https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/10/1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/10/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1002364","reference_id":"1002364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1002364"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361","reference_id":"722361","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4287","reference_id":"CVE-2013-4287","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4287"},{"reference_url":"https://puppet.com/security/cve/cve-2013-4287","reference_id":"CVE-2013-4287","reference_type":"","scores":[],"url":"https://puppet.com/security/cve/cve-2013-4287"},{"reference_url":"https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287/","reference_id":"CVE-2013-4287","reference_type":"","scores":[],"url":"https://web.archive.org/web/20160806152839/https://puppet.com/security/cve/cve-2013-4287/"},{"reference_url":"http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html","reference_id":"CVE-2013-4287.HTML","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html"},{"reference_url":"https://github.com/advisories/GHSA-9j7m-rjqx-48vh","reference_id":"GHSA-9j7m-rjqx-48vh","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-9j7m-rjqx-48vh"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1427","reference_id":"RHSA-2013:1427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1441","reference_id":"RHSA-2013:1441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1523","reference_id":"RHSA-2013:1523","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1523"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1852","reference_id":"RHSA-2013:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0207","reference_id":"RHSA-2014:0207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0207"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82334?format=json","purl":"pkg:gem/rubygems-update@2.0.8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.8"},{"url":"http://public2.vulnerablecode.io/api/packages/132456?format=json","purl":"pkg:gem/rubygems-update@2.1.0.rc.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0.rc.1"},{"url":"http://public2.vulnerablecode.io/api/packages/82335?format=json","purl":"pkg:gem/rubygems-update@2.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0"},{"url":"http://public2.vulnerablecode.io/api/packages/20455?format=json","purl":"pkg:gem/rubygems-update@2.1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.1"}],"aliases":["CVE-2013-4287","GHSA-9j7m-rjqx-48vh","OSV-97163"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ga-fgvp-5qc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6863?format=json","vulnerability_id":"VCID-ucdh-7fgy-33h8","summary":"Cryptographic Issues\nAlgorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4363.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4363","reference_id":"","reference_type":"","scores":[{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69127","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69166","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69131","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.6915","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml"},{"reference_url":"https://web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/14/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/14/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/18/8","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/18/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/20/1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/20/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1009720","reference_id":"1009720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1009720"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361","reference_id":"722361","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4363","reference_id":"CVE-2013-4363","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4363"},{"reference_url":"https://puppet.com/security/cve/cve-2013-4363","reference_id":"CVE-2013-4363","reference_type":"","scores":[],"url":"https://puppet.com/security/cve/cve-2013-4363"},{"reference_url":"http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html","reference_id":"CVE-2013-4363.HTML","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html"},{"reference_url":"https://github.com/advisories/GHSA-9qvm-2vhf-q649","reference_id":"GHSA-9qvm-2vhf-q649","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-9qvm-2vhf-q649"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84056?format=json","purl":"pkg:gem/rubygems-update@2.0.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.10"},{"url":"http://public2.vulnerablecode.io/api/packages/20456?format=json","purl":"pkg:gem/rubygems-update@2.1.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.4"},{"url":"http://public2.vulnerablecode.io/api/packages/84057?format=json","purl":"pkg:gem/rubygems-update@2.1.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.5"}],"aliases":["CVE-2013-4363","GHSA-9qvm-2vhf-q649"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucdh-7fgy-33h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8119?format=json","vulnerability_id":"VCID-xgsa-5umz-qffr","summary":"Code Injection\nRubyGems is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.","references":[{"reference_url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3485","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:3485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0378","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0583","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0585","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0585"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0899.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0899.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0899","reference_id":"","reference_type":"","scores":[{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91672","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.9173","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91716","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.9172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07362","scoring_system":"epss","scoring_elements":"0.91707","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0899"},{"reference_url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":""}],"url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1"},{"reference_url":"https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491"},{"reference_url":"https://hackerone.com/reports/226335","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://hackerone.com/reports/226335"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"},{"reference_url":"https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249"},{"reference_url":"https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100576#:~:text=1%20snapshot-,11%3A49%3A33,-Note","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100576#:~:text=1%20snapshot-,11%3A49%3A33,-Note"},{"reference_url":"https://www.debian.org/security/2017/dsa-3966","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2017/dsa-3966"},{"reference_url":"http://www.securityfocus.com/bid/100576","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100576"},{"reference_url":"http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487590","reference_id":"1487590","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487590"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0899","reference_id":"CVE-2017-0899","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0899"},{"reference_url":"https://github.com/advisories/GHSA-7gcp-2gmq-w3xh","reference_id":"GHSA-7gcp-2gmq-w3xh","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-7gcp-2gmq-w3xh"},{"reference_url":"https://security.gentoo.org/glsa/201710-01","reference_id":"GLSA-201710-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201710-01"},{"reference_url":"https://usn.ubuntu.com/3439-1/","reference_id":"USN-3439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3439-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/24624?format=json","purl":"pkg:gem/rubygems-update@2.6.13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-f7x5-hz5f-hyd3"},{"vulnerability":"VCID-ha3g-uyse-wybx"},{"vulnerability":"VCID-jkwe-c323-3yez"},{"vulnerability":"VCID-ky5r-bch5-m7dv"},{"vulnerability":"VCID-xgmc-a5rk-zqag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13"}],"aliases":["CVE-2017-0899","GHSA-7gcp-2gmq-w3xh"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xgsa-5umz-qffr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8118?format=json","vulnerability_id":"VCID-xz68-vwz2-2ke4","summary":"Improper Input Validation\nRubyGems fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.","references":[{"reference_url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3485","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2017:3485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0378","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0378"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0583","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0585","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:0585"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0901.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0901.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0901","reference_id":"","reference_type":"","scores":[{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.9527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95269","published_at":"2026-04-26T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95267","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.9525","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18555","scoring_system":"epss","scoring_elements":"0.95245","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0901"},{"reference_url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":""}],"url":"https://blog.rubygems.org/2017/08/27/2.6.13-released.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:C/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"},{"reference_url":"https://usn.ubuntu.com/3553-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3553-1"},{"reference_url":"https://usn.ubuntu.com/3553-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3553-1/"},{"reference_url":"https://usn.ubuntu.com/3685-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3685-1"},{"reference_url":"https://usn.ubuntu.com/3685-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3685-1/"},{"reference_url":"https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170907215801/http://www.securitytracker.com/id/1039249"},{"reference_url":"https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100580#:~:text=1%20snapshot-,16%3A05%3A26,-Note","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170915000000*/http://www.securityfocus.com/bid/100580#:~:text=1%20snapshot-,16%3A05%3A26,-Note"},{"reference_url":"https://www.debian.org/security/2017/dsa-3966","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2017/dsa-3966"},{"reference_url":"https://www.exploit-db.com/exploits/42611","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.exploit-db.com/exploits/42611"},{"reference_url":"https://www.exploit-db.com/exploits/42611/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/42611/"},{"reference_url":"http://www.securityfocus.com/bid/100580","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100580"},{"reference_url":"http://www.securitytracker.com/id/1039249","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487587","reference_id":"1487587","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1487587"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42611.txt","reference_id":"CVE-2017-0901","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42611.txt"},{"reference_url":"https://hackerone.com/reports/243156","reference_id":"CVE-2017-0901","reference_type":"exploit","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://hackerone.com/reports/243156"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0901","reference_id":"CVE-2017-0901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0901"},{"reference_url":"https://github.com/advisories/GHSA-pm9x-4392-2c2p","reference_id":"GHSA-pm9x-4392-2c2p","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-pm9x-4392-2c2p"},{"reference_url":"https://security.gentoo.org/glsa/201710-01","reference_id":"GLSA-201710-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/201710-01"},{"reference_url":"https://usn.ubuntu.com/3439-1/","reference_id":"USN-3439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3439-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/24624?format=json","purl":"pkg:gem/rubygems-update@2.6.13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-f7x5-hz5f-hyd3"},{"vulnerability":"VCID-ha3g-uyse-wybx"},{"vulnerability":"VCID-jkwe-c323-3yez"},{"vulnerability":"VCID-ky5r-bch5-m7dv"},{"vulnerability":"VCID-xgmc-a5rk-zqag"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.6.13"}],"aliases":["CVE-2017-0901","GHSA-pm9x-4392-2c2p"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xz68-vwz2-2ke4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7158?format=json","vulnerability_id":"VCID-zb9m-getz-3keh","summary":"Improper Input Validation\nRubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a \"DNS hijack attack.\" NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900.","references":[{"reference_url":"http://blog.rubygems.org/2015/06/08/2.2.5-released.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2015/06/08/2.2.5-released.html"},{"reference_url":"http://blog.rubygems.org/2015/06/08/2.4.8-released.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2015/06/08/2.4.8-released.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4020.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4020","reference_id":"","reference_type":"","scores":[{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66888","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.6695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.6697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66989","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66851","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4020"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubygems/rubygems/commit/5c7bfb5","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems/commit/5c7bfb5"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-4020.yml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2015-4020.yml"},{"reference_url":"https://web.archive.org/web/20200228084212/http://www.securityfocus.com/bid/75431","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200228084212/http://www.securityfocus.com/bid/75431"},{"reference_url":"https://web.archive.org/web/20200228085830/https://puppet.com/security/cve/CVE-2015-3900","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200228085830/https://puppet.com/security/cve/CVE-2015-3900"},{"reference_url":"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478"},{"reference_url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900"},{"reference_url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/","reference_id":"","reference_type":"","scores":[],"url":"https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"reference_url":"http://www.securityfocus.com/bid/75431","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/75431"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1250109","reference_id":"1250109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1250109"},{"reference_url":"https://puppet.com/security/cve/CVE-2015-3900","reference_id":"CVE-2015-3900","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://puppet.com/security/cve/CVE-2015-3900"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4020","reference_id":"CVE-2015-4020","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4020"},{"reference_url":"https://github.com/advisories/GHSA-qv62-xfj6-32xm","reference_id":"GHSA-qv62-xfj6-32xm","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qv62-xfj6-32xm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82206?format=json","purl":"pkg:gem/rubygems-update@2.0.17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.17"},{"url":"http://public2.vulnerablecode.io/api/packages/132456?format=json","purl":"pkg:gem/rubygems-update@2.1.0.rc.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.0.rc.1"},{"url":"http://public2.vulnerablecode.io/api/packages/82207?format=json","purl":"pkg:gem/rubygems-update@2.2.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.2.5"},{"url":"http://public2.vulnerablecode.io/api/packages/21197?format=json","purl":"pkg:gem/rubygems-update@2.4.8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8d7n-bfhu-dkfd"},{"vulnerability":"VCID-8hm4-c4w4-gfen"},{"vulnerability":"VCID-9t45-d5mf-3uar"},{"vulnerability":"VCID-af1f-xwwy-jfa8"},{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-mamm-cvdr-subf"},{"vulnerability":"VCID-tq93-h2ag-s3bx"},{"vulnerability":"VCID-w4ns-f42m-pyec"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.4.8"}],"aliases":["CVE-2015-4020","GHSA-qv62-xfj6-32xm"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zb9m-getz-3keh"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6863?format=json","vulnerability_id":"VCID-ucdh-7fgy-33h8","summary":"Cryptographic Issues\nAlgorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4363.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4363","reference_id":"","reference_type":"","scores":[{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69127","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69166","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69131","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.6915","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363"},{"reference_url":"https://github.com/rubygems/rubygems","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubygems/rubygems"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2013-4363.yml"},{"reference_url":"https://web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20170331150441/https://puppet.com/security/cve/cve-2013-4363"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/14/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/14/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/18/8","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/18/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/09/20/1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/09/20/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1009720","reference_id":"1009720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1009720"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361","reference_id":"722361","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722361"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4363","reference_id":"CVE-2013-4363","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4363"},{"reference_url":"https://puppet.com/security/cve/cve-2013-4363","reference_id":"CVE-2013-4363","reference_type":"","scores":[],"url":"https://puppet.com/security/cve/cve-2013-4363"},{"reference_url":"http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html","reference_id":"CVE-2013-4363.HTML","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html"},{"reference_url":"https://github.com/advisories/GHSA-9qvm-2vhf-q649","reference_id":"GHSA-9qvm-2vhf-q649","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-9qvm-2vhf-q649"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84054?format=json","purl":"pkg:gem/rubygems-update@1.8.23.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.23.2"},{"url":"http://public2.vulnerablecode.io/api/packages/84055?format=json","purl":"pkg:gem/rubygems-update@1.8.27","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.27"},{"url":"http://public2.vulnerablecode.io/api/packages/84056?format=json","purl":"pkg:gem/rubygems-update@2.0.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-k2ga-fgvp-5qc7"},{"vulnerability":"VCID-ucdh-7fgy-33h8"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.0.10"},{"url":"http://public2.vulnerablecode.io/api/packages/20456?format=json","purl":"pkg:gem/rubygems-update@2.1.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.4"},{"url":"http://public2.vulnerablecode.io/api/packages/84057?format=json","purl":"pkg:gem/rubygems-update@2.1.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b36p-re17-n7dq"},{"vulnerability":"VCID-cde2-rv4n-tkau"},{"vulnerability":"VCID-ee8m-jtmh-dfbs"},{"vulnerability":"VCID-jmzh-89dm-r7g2"},{"vulnerability":"VCID-xgsa-5umz-qffr"},{"vulnerability":"VCID-xz68-vwz2-2ke4"},{"vulnerability":"VCID-zb9m-getz-3keh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@2.1.5"}],"aliases":["CVE-2013-4363","GHSA-9qvm-2vhf-q649"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucdh-7fgy-33h8"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/rubygems-update@1.8.27"}