{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57855?format=json","vulnerability_id":"VCID-rwak-wvuw-qbcg","summary":"security update","aliases":[{"alias":"CVE-2014-4975"},{"alias":"GHSA-gxj7-mcpg-jpr6"},{"alias":"OSV-108971"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035320?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%2Bdeb7u5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%252Bdeb7u5"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571287?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2"},{"url":"http://public2.vulnerablecode.io/api/packages/571288?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2%2Bdeb6u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2%252Bdeb6u2"},{"url":"http://public2.vulnerablecode.io/api/packages/571289?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2%2Bdeb6u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2%252Bdeb6u7"},{"url":"http://public2.vulnerablecode.io/api/packages/571290?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/120671?format=json","purl":"pkg:rpm/redhat/ruby@2.0.0.353-22?arch=el7_0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@2.0.0.353-22%3Farch=el7_0"},{"url":"http://public2.vulnerablecode.io/api/packages/120669?format=json","purl":"pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/120668?format=json","purl":"pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/120673?format=json","purl":"pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/120672?format=json","purl":"pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/1072974?format=json","purl":"pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1?arch=hum1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vp9-6q85-5ffv"},{"vulnerability":"VCID-2sv2-6snv-2bd3"},{"vulnerability":"VCID-4qm3-nbsk-73he"},{"vulnerability":"VCID-4yvc-uzev-wua4"},{"vulnerability":"VCID-5bte-uex2-f7du"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-6dxj-me8k-qfak"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-9gp6-pvw1-ufhs"},{"vulnerability":"VCID-9x9w-2k98-wydm"},{"vulnerability":"VCID-a15m-bcma-vfa7"},{"vulnerability":"VCID-ar57-vndq-yka6"},{"vulnerability":"VCID-arjz-geyr-q7e3"},{"vulnerability":"VCID-bdar-wgfe-qqgf"},{"vulnerability":"VCID-c9sy-czbr-tfer"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-dh8q-zyat-43ce"},{"vulnerability":"VCID-ea13-mua4-1fb9"},{"vulnerability":"VCID-fw7k-88kf-1kgg"},{"vulnerability":"VCID-g1eu-mgx8-j3dw"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-jx79-wpg7-2yaa"},{"vulnerability":"VCID-mzqm-gc4w-fbfp"},{"vulnerability":"VCID-nxub-6qsu-hbhk"},{"vulnerability":"VCID-pegr-f5mh-ekdz"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-sf98-mryd-yfb3"},{"vulnerability":"VCID-sfzh-hn56-hbak"},{"vulnerability":"VCID-t9y5-hd9b-bkc4"},{"vulnerability":"VCID-vcz9-dvf4-47am"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"},{"vulnerability":"VCID-x126-x9qm-e7d3"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y56y-5am7-wkhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1%3Farch=hum1"},{"url":"http://public2.vulnerablecode.io/api/packages/1072973?format=json","purl":"pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1?arch=hum1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vp9-6q85-5ffv"},{"vulnerability":"VCID-2sv2-6snv-2bd3"},{"vulnerability":"VCID-4qm3-nbsk-73he"},{"vulnerability":"VCID-4yvc-uzev-wua4"},{"vulnerability":"VCID-5bte-uex2-f7du"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-6dxj-me8k-qfak"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-9gp6-pvw1-ufhs"},{"vulnerability":"VCID-9x9w-2k98-wydm"},{"vulnerability":"VCID-a15m-bcma-vfa7"},{"vulnerability":"VCID-ar57-vndq-yka6"},{"vulnerability":"VCID-arjz-geyr-q7e3"},{"vulnerability":"VCID-bdar-wgfe-qqgf"},{"vulnerability":"VCID-c9sy-czbr-tfer"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-dh8q-zyat-43ce"},{"vulnerability":"VCID-ea13-mua4-1fb9"},{"vulnerability":"VCID-fw7k-88kf-1kgg"},{"vulnerability":"VCID-g1eu-mgx8-j3dw"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-jx79-wpg7-2yaa"},{"vulnerability":"VCID-mzqm-gc4w-fbfp"},{"vulnerability":"VCID-nxub-6qsu-hbhk"},{"vulnerability":"VCID-pegr-f5mh-ekdz"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-sf98-mryd-yfb3"},{"vulnerability":"VCID-sfzh-hn56-hbak"},{"vulnerability":"VCID-t9y5-hd9b-bkc4"},{"vulnerability":"VCID-vcz9-dvf4-47am"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"},{"vulnerability":"VCID-x126-x9qm-e7d3"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y56y-5am7-wkhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1%3Farch=hum1"},{"url":"http://public2.vulnerablecode.io/api/packages/1072972?format=json","purl":"pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3?arch=hum1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vp9-6q85-5ffv"},{"vulnerability":"VCID-2sv2-6snv-2bd3"},{"vulnerability":"VCID-4qm3-nbsk-73he"},{"vulnerability":"VCID-4yvc-uzev-wua4"},{"vulnerability":"VCID-5bte-uex2-f7du"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-6dxj-me8k-qfak"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-9gp6-pvw1-ufhs"},{"vulnerability":"VCID-9x9w-2k98-wydm"},{"vulnerability":"VCID-a15m-bcma-vfa7"},{"vulnerability":"VCID-ar57-vndq-yka6"},{"vulnerability":"VCID-arjz-geyr-q7e3"},{"vulnerability":"VCID-bdar-wgfe-qqgf"},{"vulnerability":"VCID-c9sy-czbr-tfer"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-dh8q-zyat-43ce"},{"vulnerability":"VCID-ea13-mua4-1fb9"},{"vulnerability":"VCID-fw7k-88kf-1kgg"},{"vulnerability":"VCID-g1eu-mgx8-j3dw"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-jx79-wpg7-2yaa"},{"vulnerability":"VCID-mzqm-gc4w-fbfp"},{"vulnerability":"VCID-nxub-6qsu-hbhk"},{"vulnerability":"VCID-pegr-f5mh-ekdz"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-sf98-mryd-yfb3"},{"vulnerability":"VCID-sfzh-hn56-hbak"},{"vulnerability":"VCID-t9y5-hd9b-bkc4"},{"vulnerability":"VCID-vcz9-dvf4-47am"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"},{"vulnerability":"VCID-x126-x9qm-e7d3"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y56y-5am7-wkhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3%3Farch=hum1"},{"url":"http://public2.vulnerablecode.io/api/packages/130659?format=json","purl":"pkg:ruby/ruby@2.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-3uaa-r5vu-2fg9"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.2"},{"url":"http://public2.vulnerablecode.io/api/packages/130666?format=json","purl":"pkg:ruby/ruby@2.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cad-uybu-2uau"},{"vulnerability":"VCID-3uaa-r5vu-2fg9"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-bad1-7aa4-cugv"},{"vulnerability":"VCID-beub-d11r-nbe4"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-fapg-pt6b-rfb2"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rdme-1q3s-43d8"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y29u-wpkt-rkgp"},{"vulnerability":"VCID-zwxw-299r-wfgx"},{"vulnerability":"VCID-zybm-uuxu-67gh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.3"}],"references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0472.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0472.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1912.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1912.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1913.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1913.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1914.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1914.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4975.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4975","reference_id":"","reference_type":"","scores":[{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87551","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87462","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87508","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87503","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03404","scoring_system":"epss","scoring_elements":"0.87517","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87546","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87523","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.8748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03449","scoring_system":"epss","scoring_elements":"0.87517","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4975"},{"reference_url":"https://bugs.ruby-lang.org/issues/10019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ruby-lang.org/issues/10019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94706","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/94706"},{"reference_url":"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778","reference_id":"","reference_type":"","scores":[],"url":"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778"},{"reference_url":"http://www.debian.org/security/2015/dsa-3157","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3157"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:129","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:129"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/09/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/09/13"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/68474","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68474"},{"reference_url":"http://www.ubuntu.com/usn/USN-2397-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2397-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1118158","reference_id":"1118158","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1118158"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4975","reference_id":"CVE-2014-4975","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1912","reference_id":"RHSA-2014:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1913","reference_id":"RHSA-2014:1913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1914","reference_id":"RHSA-2014:1914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7305","reference_id":"RHSA-2026:7305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7307","reference_id":"RHSA-2026:7307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8838","reference_id":"RHSA-2026:8838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8838"},{"reference_url":"https://usn.ubuntu.com/2397-1/","reference_id":"USN-2397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2397-1/"}],"weaknesses":[{"cwe_id":193,"name":"Off-by-one Error","description":"A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value."},{"cwe_id":121,"name":"Stack-based Buffer Overflow","description":"A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function)."},{"cwe_id":119,"name":"Improper Restriction of Operations within the Bounds of a Memory Buffer","description":"The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."}],"exploits":[],"severity_range_score":"5.0 - 5.0","exploitability":"0.5","weighted_severity":"4.5","risk_score":2.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rwak-wvuw-qbcg"}