{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57857?format=json","vulnerability_id":"VCID-g7ju-q41v-wyhd","summary":"security update","aliases":[{"alias":"CVE-2014-8090"},{"alias":"GHSA-2x97-vvh4-m4q4"},{"alias":"OSV-114641"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572193?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.358-7.1%2Bdeb7u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.358-7.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035320?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%2Bdeb7u5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%252Bdeb7u5"},{"url":"http://public2.vulnerablecode.io/api/packages/85815?format=json","purl":"pkg:ebuild/dev-lang/ruby@2.0.0_p598","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/ruby@2.0.0_p598"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572186?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.2-7sarge6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.2-7sarge6"},{"url":"http://public2.vulnerablecode.io/api/packages/572187?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.5-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.5-4"},{"url":"http://public2.vulnerablecode.io/api/packages/572188?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.5-4etch5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.5-4etch5"},{"url":"http://public2.vulnerablecode.io/api/packages/572189?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.72-3lenny1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.72-3lenny1"},{"url":"http://public2.vulnerablecode.io/api/packages/572190?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze1"},{"url":"http://public2.vulnerablecode.io/api/packages/572191?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze2"},{"url":"http://public2.vulnerablecode.io/api/packages/572192?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze5"},{"url":"http://public2.vulnerablecode.io/api/packages/571287?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2"},{"url":"http://public2.vulnerablecode.io/api/packages/571288?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2%2Bdeb6u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2%252Bdeb6u2"},{"url":"http://public2.vulnerablecode.io/api/packages/571289?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2%2Bdeb6u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2%252Bdeb6u7"},{"url":"http://public2.vulnerablecode.io/api/packages/571290?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/120670?format=json","purl":"pkg:rpm/redhat/ruby@1.8.7.374-3?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.7.374-3%3Farch=el6_6"},{"url":"http://public2.vulnerablecode.io/api/packages/120671?format=json","purl":"pkg:rpm/redhat/ruby@2.0.0.353-22?arch=el7_0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@2.0.0.353-22%3Farch=el7_0"},{"url":"http://public2.vulnerablecode.io/api/packages/120669?format=json","purl":"pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/120668?format=json","purl":"pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby193-ruby@1.9.3.484-50%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/120673?format=json","purl":"pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24?arch=el7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24%3Farch=el7"},{"url":"http://public2.vulnerablecode.io/api/packages/120672?format=json","purl":"pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby200-ruby@2.0.0.353-24%3Farch=el6"},{"url":"http://public2.vulnerablecode.io/api/packages/1072974?format=json","purl":"pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1?arch=hum1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vp9-6q85-5ffv"},{"vulnerability":"VCID-2sv2-6snv-2bd3"},{"vulnerability":"VCID-4qm3-nbsk-73he"},{"vulnerability":"VCID-4yvc-uzev-wua4"},{"vulnerability":"VCID-5bte-uex2-f7du"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-6dxj-me8k-qfak"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-9gp6-pvw1-ufhs"},{"vulnerability":"VCID-9x9w-2k98-wydm"},{"vulnerability":"VCID-a15m-bcma-vfa7"},{"vulnerability":"VCID-ar57-vndq-yka6"},{"vulnerability":"VCID-arjz-geyr-q7e3"},{"vulnerability":"VCID-bdar-wgfe-qqgf"},{"vulnerability":"VCID-c9sy-czbr-tfer"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-dh8q-zyat-43ce"},{"vulnerability":"VCID-ea13-mua4-1fb9"},{"vulnerability":"VCID-fw7k-88kf-1kgg"},{"vulnerability":"VCID-g1eu-mgx8-j3dw"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-jx79-wpg7-2yaa"},{"vulnerability":"VCID-mzqm-gc4w-fbfp"},{"vulnerability":"VCID-nxub-6qsu-hbhk"},{"vulnerability":"VCID-pegr-f5mh-ekdz"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-sf98-mryd-yfb3"},{"vulnerability":"VCID-sfzh-hn56-hbak"},{"vulnerability":"VCID-t9y5-hd9b-bkc4"},{"vulnerability":"VCID-vcz9-dvf4-47am"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"},{"vulnerability":"VCID-x126-x9qm-e7d3"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y56y-5am7-wkhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1%3Farch=hum1"},{"url":"http://public2.vulnerablecode.io/api/packages/1072973?format=json","purl":"pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1?arch=hum1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vp9-6q85-5ffv"},{"vulnerability":"VCID-2sv2-6snv-2bd3"},{"vulnerability":"VCID-4qm3-nbsk-73he"},{"vulnerability":"VCID-4yvc-uzev-wua4"},{"vulnerability":"VCID-5bte-uex2-f7du"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-6dxj-me8k-qfak"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-9gp6-pvw1-ufhs"},{"vulnerability":"VCID-9x9w-2k98-wydm"},{"vulnerability":"VCID-a15m-bcma-vfa7"},{"vulnerability":"VCID-ar57-vndq-yka6"},{"vulnerability":"VCID-arjz-geyr-q7e3"},{"vulnerability":"VCID-bdar-wgfe-qqgf"},{"vulnerability":"VCID-c9sy-czbr-tfer"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-dh8q-zyat-43ce"},{"vulnerability":"VCID-ea13-mua4-1fb9"},{"vulnerability":"VCID-fw7k-88kf-1kgg"},{"vulnerability":"VCID-g1eu-mgx8-j3dw"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-jx79-wpg7-2yaa"},{"vulnerability":"VCID-mzqm-gc4w-fbfp"},{"vulnerability":"VCID-nxub-6qsu-hbhk"},{"vulnerability":"VCID-pegr-f5mh-ekdz"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-sf98-mryd-yfb3"},{"vulnerability":"VCID-sfzh-hn56-hbak"},{"vulnerability":"VCID-t9y5-hd9b-bkc4"},{"vulnerability":"VCID-vcz9-dvf4-47am"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"},{"vulnerability":"VCID-x126-x9qm-e7d3"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y56y-5am7-wkhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1%3Farch=hum1"},{"url":"http://public2.vulnerablecode.io/api/packages/1072972?format=json","purl":"pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3?arch=hum1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vp9-6q85-5ffv"},{"vulnerability":"VCID-2sv2-6snv-2bd3"},{"vulnerability":"VCID-4qm3-nbsk-73he"},{"vulnerability":"VCID-4yvc-uzev-wua4"},{"vulnerability":"VCID-5bte-uex2-f7du"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-6dxj-me8k-qfak"},{"vulnerability":"VCID-91b7-xx8t-rqhr"},{"vulnerability":"VCID-9gp6-pvw1-ufhs"},{"vulnerability":"VCID-9x9w-2k98-wydm"},{"vulnerability":"VCID-a15m-bcma-vfa7"},{"vulnerability":"VCID-ar57-vndq-yka6"},{"vulnerability":"VCID-arjz-geyr-q7e3"},{"vulnerability":"VCID-bdar-wgfe-qqgf"},{"vulnerability":"VCID-c9sy-czbr-tfer"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-dh8q-zyat-43ce"},{"vulnerability":"VCID-ea13-mua4-1fb9"},{"vulnerability":"VCID-fw7k-88kf-1kgg"},{"vulnerability":"VCID-g1eu-mgx8-j3dw"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-jx79-wpg7-2yaa"},{"vulnerability":"VCID-mzqm-gc4w-fbfp"},{"vulnerability":"VCID-nxub-6qsu-hbhk"},{"vulnerability":"VCID-pegr-f5mh-ekdz"},{"vulnerability":"VCID-qyz5-zmnt-qucy"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-sf98-mryd-yfb3"},{"vulnerability":"VCID-sfzh-hn56-hbak"},{"vulnerability":"VCID-t9y5-hd9b-bkc4"},{"vulnerability":"VCID-vcz9-dvf4-47am"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"},{"vulnerability":"VCID-x126-x9qm-e7d3"},{"vulnerability":"VCID-xkd6-jvma-skfk"},{"vulnerability":"VCID-y56y-5am7-wkhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3%3Farch=hum1"},{"url":"http://public2.vulnerablecode.io/api/packages/130661?format=json","purl":"pkg:ruby/ruby@1.9.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-ggcn-qfts-rbeu"},{"vulnerability":"VCID-hunm-dpcd-r3ff"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.4"},{"url":"http://public2.vulnerablecode.io/api/packages/130658?format=json","purl":"pkg:ruby/ruby@2.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-3uaa-r5vu-2fg9"},{"vulnerability":"VCID-cvs2-zecm-z3h8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-pkg9-61ah-kbex"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.0.1"}],"references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0472.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0472.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1911.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1911.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1912.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1912.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1913.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1913.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1914.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1914.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8090.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8090","reference_id":"","reference_type":"","scores":[{"value":"0.09486","scoring_system":"epss","scoring_elements":"0.9288","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09486","scoring_system":"epss","scoring_elements":"0.92846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09486","scoring_system":"epss","scoring_elements":"0.92855","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09486","scoring_system":"epss","scoring_elements":"0.92868","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93242","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93267","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.9328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10488","scoring_system":"epss","scoring_elements":"0.93229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11898","scoring_system":"epss","scoring_elements":"0.93805","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11898","scoring_system":"epss","scoring_elements":"0.93809","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12441","scoring_system":"epss","scoring_elements":"0.93987","published_at":"2026-05-14T12:55:00Z"},{"value":"0.12441","scoring_system":"epss","scoring_elements":"0.93991","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090"},{"reference_url":"http://secunia.com/advisories/59948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59948"},{"reference_url":"http://secunia.com/advisories/62050","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62050"},{"reference_url":"http://secunia.com/advisories/62748","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62748"},{"reference_url":"https://support.apple.com/HT205267","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT205267"},{"reference_url":"https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090"},{"reference_url":"https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"},{"reference_url":"http://www.debian.org/security/2015/dsa-3157","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3157"},{"reference_url":"http://www.debian.org/security/2015/dsa-3159","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3159"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:129","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:129"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/71230","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71230"},{"reference_url":"http://www.ubuntu.com/usn/USN-2412-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2412-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1159927","reference_id":"1159927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1159927"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p448:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p448:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p448:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p545:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p545:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p545:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p547:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p547:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p547:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p451:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p451:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p451:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:p550:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:*:p550:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:p550:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8090","reference_id":"CVE-2014-8090","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8090"},{"reference_url":"https://security.gentoo.org/glsa/201412-27","reference_id":"GLSA-201412-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1911","reference_id":"RHSA-2014:1911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1912","reference_id":"RHSA-2014:1912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1913","reference_id":"RHSA-2014:1913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1914","reference_id":"RHSA-2014:1914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7305","reference_id":"RHSA-2026:7305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7307","reference_id":"RHSA-2026:7307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8838","reference_id":"RHSA-2026:8838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8838"},{"reference_url":"https://usn.ubuntu.com/2412-1/","reference_id":"USN-2412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2412-1/"}],"weaknesses":[{"cwe_id":776,"name":"Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')","description":"The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities."}],"exploits":[],"severity_range_score":"5.0 - 5.0","exploitability":"0.5","weighted_severity":"4.5","risk_score":2.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g7ju-q41v-wyhd"}