{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6808?format=json","vulnerability_id":"VCID-5xez-skrj-b3h4","summary":"Entity expansion DoS vulnerability in REXML\n`lib/rexml/text.rb` in the REXML parser allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.","aliases":[{"alias":"CVE-2013-1821"},{"alias":"GHSA-hgg7-cghq-xhf4"},{"alias":"OSV-90587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572193?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.358-7.1%2Bdeb7u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.358-7.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/571290?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.3.194-8.1%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/85815?format=json","purl":"pkg:ebuild/dev-lang/ruby@2.0.0_p598","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/ruby@2.0.0_p598"},{"url":"http://public2.vulnerablecode.io/api/packages/20179?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.3"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572186?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.2-7sarge6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.2-7sarge6"},{"url":"http://public2.vulnerablecode.io/api/packages/572187?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.5-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.5-4"},{"url":"http://public2.vulnerablecode.io/api/packages/572188?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.5-4etch5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.5-4etch5"},{"url":"http://public2.vulnerablecode.io/api/packages/572189?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.72-3lenny1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.72-3lenny1"},{"url":"http://public2.vulnerablecode.io/api/packages/572190?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze1"},{"url":"http://public2.vulnerablecode.io/api/packages/572191?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze2"},{"url":"http://public2.vulnerablecode.io/api/packages/572192?format=json","purl":"pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.8@1.8.7.302-2squeeze5"},{"url":"http://public2.vulnerablecode.io/api/packages/571287?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2"},{"url":"http://public2.vulnerablecode.io/api/packages/571288?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2%2Bdeb6u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2%252Bdeb6u2"},{"url":"http://public2.vulnerablecode.io/api/packages/571289?format=json","purl":"pkg:deb/debian/ruby1.9.1@1.9.2.0-2%2Bdeb6u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-k6dd-ykw2-nfh6"},{"vulnerability":"VCID-rwak-wvuw-qbcg"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby1.9.1@1.9.2.0-2%252Bdeb6u7"},{"url":"http://public2.vulnerablecode.io/api/packages/148390?format=json","purl":"pkg:maven/org.jruby/jruby@0.8.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@0.8.3"},{"url":"http://public2.vulnerablecode.io/api/packages/148391?format=json","purl":"pkg:maven/org.jruby/jruby@0.9.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@0.9.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148392?format=json","purl":"pkg:maven/org.jruby/jruby@0.9.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@0.9.2"},{"url":"http://public2.vulnerablecode.io/api/packages/148393?format=json","purl":"pkg:maven/org.jruby/jruby@0.9.8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@0.9.8"},{"url":"http://public2.vulnerablecode.io/api/packages/148394?format=json","purl":"pkg:maven/org.jruby/jruby@0.9.9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@0.9.9"},{"url":"http://public2.vulnerablecode.io/api/packages/148395?format=json","purl":"pkg:maven/org.jruby/jruby@1.0RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148396?format=json","purl":"pkg:maven/org.jruby/jruby@1.0RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148397?format=json","purl":"pkg:maven/org.jruby/jruby@1.0RC3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0RC3"},{"url":"http://public2.vulnerablecode.io/api/packages/148398?format=json","purl":"pkg:maven/org.jruby/jruby@1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148399?format=json","purl":"pkg:maven/org.jruby/jruby@1.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148400?format=json","purl":"pkg:maven/org.jruby/jruby@1.0.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0.2"},{"url":"http://public2.vulnerablecode.io/api/packages/148401?format=json","purl":"pkg:maven/org.jruby/jruby@1.0.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.0.3"},{"url":"http://public2.vulnerablecode.io/api/packages/148402?format=json","purl":"pkg:maven/org.jruby/jruby@1.1b1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1b1"},{"url":"http://public2.vulnerablecode.io/api/packages/148403?format=json","purl":"pkg:maven/org.jruby/jruby@1.1RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148404?format=json","purl":"pkg:maven/org.jruby/jruby@1.1RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148405?format=json","purl":"pkg:maven/org.jruby/jruby@1.1RC3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1RC3"},{"url":"http://public2.vulnerablecode.io/api/packages/148406?format=json","purl":"pkg:maven/org.jruby/jruby@1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148407?format=json","purl":"pkg:maven/org.jruby/jruby@1.1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148408?format=json","purl":"pkg:maven/org.jruby/jruby@1.1.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1.2"},{"url":"http://public2.vulnerablecode.io/api/packages/148409?format=json","purl":"pkg:maven/org.jruby/jruby@1.1.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1.4"},{"url":"http://public2.vulnerablecode.io/api/packages/148410?format=json","purl":"pkg:maven/org.jruby/jruby@1.1.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1.5"},{"url":"http://public2.vulnerablecode.io/api/packages/148411?format=json","purl":"pkg:maven/org.jruby/jruby@1.1.6RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1.6RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148412?format=json","purl":"pkg:maven/org.jruby/jruby@1.1.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.1.6"},{"url":"http://public2.vulnerablecode.io/api/packages/148413?format=json","purl":"pkg:maven/org.jruby/jruby@1.2RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.2RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148414?format=json","purl":"pkg:maven/org.jruby/jruby@1.2.0RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.2.0RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148415?format=json","purl":"pkg:maven/org.jruby/jruby@1.2.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148416?format=json","purl":"pkg:maven/org.jruby/jruby@1.3.0RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.3.0RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148417?format=json","purl":"pkg:maven/org.jruby/jruby@1.3.0RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.3.0RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148418?format=json","purl":"pkg:maven/org.jruby/jruby@1.3.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.3.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148419?format=json","purl":"pkg:maven/org.jruby/jruby@1.3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.3.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148420?format=json","purl":"pkg:maven/org.jruby/jruby@1.4.0RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.4.0RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148421?format=json","purl":"pkg:maven/org.jruby/jruby@1.4.0RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.4.0RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148422?format=json","purl":"pkg:maven/org.jruby/jruby@1.4.0RC3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.4.0RC3"},{"url":"http://public2.vulnerablecode.io/api/packages/148423?format=json","purl":"pkg:maven/org.jruby/jruby@1.4.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.4.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148424?format=json","purl":"pkg:maven/org.jruby/jruby@1.4.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.4.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148425?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.0.RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.0.RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148426?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.0.RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.0.RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148427?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.0.RC3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.0.RC3"},{"url":"http://public2.vulnerablecode.io/api/packages/148428?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148429?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148430?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.2"},{"url":"http://public2.vulnerablecode.io/api/packages/148431?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.3"},{"url":"http://public2.vulnerablecode.io/api/packages/148432?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.5"},{"url":"http://public2.vulnerablecode.io/api/packages/148433?format=json","purl":"pkg:maven/org.jruby/jruby@1.5.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.5.6"},{"url":"http://public2.vulnerablecode.io/api/packages/148434?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.0.RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.0.RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148435?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.0.RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.0.RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148436?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.0.RC3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.0.RC3"},{"url":"http://public2.vulnerablecode.io/api/packages/148437?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148438?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148439?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.2"},{"url":"http://public2.vulnerablecode.io/api/packages/148440?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.3"},{"url":"http://public2.vulnerablecode.io/api/packages/148441?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.4"},{"url":"http://public2.vulnerablecode.io/api/packages/148442?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.5"},{"url":"http://public2.vulnerablecode.io/api/packages/148443?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.5.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148444?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.6"},{"url":"http://public2.vulnerablecode.io/api/packages/148445?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.7"},{"url":"http://public2.vulnerablecode.io/api/packages/148446?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.7.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.7.1"},{"url":"http://public2.vulnerablecode.io/api/packages/148447?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.7.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.7.2"},{"url":"http://public2.vulnerablecode.io/api/packages/148448?format=json","purl":"pkg:maven/org.jruby/jruby@1.6.8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.6.8"},{"url":"http://public2.vulnerablecode.io/api/packages/148449?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.0.RC1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.0.RC1"},{"url":"http://public2.vulnerablecode.io/api/packages/148450?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.0.RC2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.0.RC2"},{"url":"http://public2.vulnerablecode.io/api/packages/148451?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148452?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.0.preview1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.0.preview1"},{"url":"http://public2.vulnerablecode.io/api/packages/148453?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.0.preview2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.0.preview2"},{"url":"http://public2.vulnerablecode.io/api/packages/20178?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-ebq1-gkhe-pua7"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.1"},{"url":"http://public2.vulnerablecode.io/api/packages/20274?format=json","purl":"pkg:maven/org.jruby/jruby@1.7.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u1a-v9d1-rfac"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-ebq1-gkhe-pua7"},{"vulnerability":"VCID-uudj-r63z-kban"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jruby/jruby@1.7.2"},{"url":"http://public2.vulnerablecode.io/api/packages/124701?format=json","purl":"pkg:rpm/redhat/ruby@1.8.5-29?arch=el5_9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5xez-skrj-b3h4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.5-29%3Farch=el5_9"},{"url":"http://public2.vulnerablecode.io/api/packages/124702?format=json","purl":"pkg:rpm/redhat/ruby@1.8.7.352-10?arch=el6_4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3kkj-nt28-8qg6"},{"vulnerability":"VCID-5xez-skrj-b3h4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.7.352-10%3Farch=el6_4"},{"url":"http://public2.vulnerablecode.io/api/packages/130661?format=json","purl":"pkg:ruby/ruby@1.9.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1bdw-9rs5-6ycg"},{"vulnerability":"VCID-5xez-skrj-b3h4"},{"vulnerability":"VCID-bjts-v9q2-9yg8"},{"vulnerability":"VCID-g7ju-q41v-wyhd"},{"vulnerability":"VCID-ggcn-qfts-rbeu"},{"vulnerability":"VCID-hunm-dpcd-r3ff"},{"vulnerability":"VCID-jj3a-fpsa-a7at"},{"vulnerability":"VCID-wzdf-d9fv-u3hh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.4"}],"references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0611.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0611.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0612.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0612.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1028.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1147.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1147.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1821.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1821","reference_id":"","reference_type":"","scores":[{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.9559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.95557","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.95565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.9557","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.95573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.9558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.95583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.95587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20672","scoring_system":"epss","scoring_elements":"0.95588","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1821"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=914716","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=914716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164"},{"reference_url":"http://secunia.com/advisories/52783","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52783"},{"reference_url":"http://secunia.com/advisories/52902","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52902"},{"reference_url":"https://github.com/jruby/jruby","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jruby/jruby"},{"reference_url":"https://github.com/victims/victims-cve-db/blob/master/database/java/2013/1821.yaml","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/victims/victims-cve-db/blob/master/database/java/2013/1821.yaml"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1821","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1821"},{"reference_url":"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"},{"reference_url":"https://www.jruby.org/2013/02/21/jruby-1-7-3.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.jruby.org/2013/02/21/jruby-1-7-3.html"},{"reference_url":"https://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22"},{"reference_url":"http://www.debian.org/security/2013/dsa-2738","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2013/dsa-2738"},{"reference_url":"http://www.debian.org/security/2013/dsa-2809","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2013/dsa-2809"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:124","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/03/06/5","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/03/06/5"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"reference_url":"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22"},{"reference_url":"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/","reference_id":"","reference_type":"","scores":[],"url":"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"},{"reference_url":"http://www.securityfocus.com/bid/58141","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58141"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862"},{"reference_url":"http://www.ubuntu.com/usn/USN-1780-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-1780-1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*"},{"reference_url":"https://github.com/advisories/GHSA-hgg7-cghq-xhf4","reference_id":"GHSA-hgg7-cghq-xhf4","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-hgg7-cghq-xhf4"},{"reference_url":"https://security.gentoo.org/glsa/201412-27","reference_id":"GLSA-201412-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0611","reference_id":"RHSA-2013:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0611"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0612","reference_id":"RHSA-2013:0612","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1028","reference_id":"RHSA-2013:1028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1147","reference_id":"RHSA-2013:1147","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1147"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1185","reference_id":"RHSA-2013:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1185"},{"reference_url":"https://usn.ubuntu.com/1780-1/","reference_id":"USN-1780-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1780-1/"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."},{"cwe_id":400,"name":"Uncontrolled Resource Consumption","description":"The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xez-skrj-b3h4"}