Search for vulnerabilities
Vulnerability details: VCID-421x-nuyc-aaap
System Score Found at
cvssv3 4.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27281.json
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00126 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00616 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00661 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02063 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02281 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02646 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02646 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02646 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02646 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.02646 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03067 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03539 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03539 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03539 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03539 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03539 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
epss 0.03539 https://api.first.org/data/v1/epss?cve=CVE-2024-27281
cvssv3.1 4.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr LOW https://github.com/advisories/GHSA-592j-995h-p23j
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-592j-995h-p23j
cvssv3.1 4.5 https://github.com/ruby/rdoc
generic_textual LOW https://github.com/ruby/rdoc
generic_textual MODERATE https://github.com/ruby/rdoc
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/1254b0066f312ddbf7fae7a195e66ce5b3bc6656
generic_textual LOW https://github.com/ruby/rdoc/commit/1254b0066f312ddbf7fae7a195e66ce5b3bc6656
generic_textual MODERATE https://github.com/ruby/rdoc/commit/1254b0066f312ddbf7fae7a195e66ce5b3bc6656
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/32ff6ba0bebd8ea26f569da5fd23be2937f6a644
generic_textual LOW https://github.com/ruby/rdoc/commit/32ff6ba0bebd8ea26f569da5fd23be2937f6a644
generic_textual MODERATE https://github.com/ruby/rdoc/commit/32ff6ba0bebd8ea26f569da5fd23be2937f6a644
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/48617985e9fbc2825219d55f04e3e0e98d2923be
generic_textual LOW https://github.com/ruby/rdoc/commit/48617985e9fbc2825219d55f04e3e0e98d2923be
generic_textual MODERATE https://github.com/ruby/rdoc/commit/48617985e9fbc2825219d55f04e3e0e98d2923be
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/811f125a4a0cc968e3eb18e16ea6c1a3b49a11bf
generic_textual LOW https://github.com/ruby/rdoc/commit/811f125a4a0cc968e3eb18e16ea6c1a3b49a11bf
generic_textual MODERATE https://github.com/ruby/rdoc/commit/811f125a4a0cc968e3eb18e16ea6c1a3b49a11bf
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/a5de13bf0f0c26f8e764e82b5bf4bf8bffc7198e
generic_textual LOW https://github.com/ruby/rdoc/commit/a5de13bf0f0c26f8e764e82b5bf4bf8bffc7198e
generic_textual MODERATE https://github.com/ruby/rdoc/commit/a5de13bf0f0c26f8e764e82b5bf4bf8bffc7198e
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/d22ba930f1f611dda531dba04cd3d2531bb3f8a5
generic_textual LOW https://github.com/ruby/rdoc/commit/d22ba930f1f611dda531dba04cd3d2531bb3f8a5
generic_textual MODERATE https://github.com/ruby/rdoc/commit/d22ba930f1f611dda531dba04cd3d2531bb3f8a5
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/da7a0c7553ef7250ca665a3fecdc01dbaacbb43d
generic_textual LOW https://github.com/ruby/rdoc/commit/da7a0c7553ef7250ca665a3fecdc01dbaacbb43d
generic_textual MODERATE https://github.com/ruby/rdoc/commit/da7a0c7553ef7250ca665a3fecdc01dbaacbb43d
cvssv3.1 4.5 https://github.com/ruby/rdoc/commit/e4a0e71e6f1032f8b4e5e58b4ef60d702c22ce17
generic_textual LOW https://github.com/ruby/rdoc/commit/e4a0e71e6f1032f8b4e5e58b4ef60d702c22ce17
generic_textual MODERATE https://github.com/ruby/rdoc/commit/e4a0e71e6f1032f8b4e5e58b4ef60d702c22ce17
cvssv3.1 4.5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2024-27281.yml
generic_textual LOW https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2024-27281.yml
cvssv3.1 4.5 https://hackerone.com/reports/1187477
generic_textual LOW https://hackerone.com/reports/1187477
generic_textual MODERATE https://hackerone.com/reports/1187477
ssvc Track https://hackerone.com/reports/1187477
cvssv3.1 4.5 https://nvd.nist.gov/vuln/detail/CVE-2024-27281
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2024-27281
cvssv3.1 4.5 https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281
generic_textual LOW https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281
generic_textual MODERATE https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281
cvssv3 4.5 https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
cvssv3.1 4.5 https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
ssvc Track https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27281.json
https://api.first.org/data/v1/epss?cve=CVE-2024-27281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27281
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/ruby/rdoc
https://github.com/ruby/rdoc/commit/1254b0066f312ddbf7fae7a195e66ce5b3bc6656
https://github.com/ruby/rdoc/commit/32ff6ba0bebd8ea26f569da5fd23be2937f6a644
https://github.com/ruby/rdoc/commit/48617985e9fbc2825219d55f04e3e0e98d2923be
https://github.com/ruby/rdoc/commit/811f125a4a0cc968e3eb18e16ea6c1a3b49a11bf
https://github.com/ruby/rdoc/commit/a5de13bf0f0c26f8e764e82b5bf4bf8bffc7198e
https://github.com/ruby/rdoc/commit/d22ba930f1f611dda531dba04cd3d2531bb3f8a5
https://github.com/ruby/rdoc/commit/da7a0c7553ef7250ca665a3fecdc01dbaacbb43d
https://github.com/ruby/rdoc/commit/e4a0e71e6f1032f8b4e5e58b4ef60d702c22ce17
https://hackerone.com/reports/1187477
https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281
https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
1067802 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067802
2270749 https://bugzilla.redhat.com/show_bug.cgi?id=2270749
CVE-2024-27281 https://nvd.nist.gov/vuln/detail/CVE-2024-27281
CVE-2024-27281.YML https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2024-27281.yml
GHSA-592j-995h-p23j https://github.com/advisories/GHSA-592j-995h-p23j
GLSA-202406-03 https://security.gentoo.org/glsa/202406-03
RHSA-2024:3500 https://access.redhat.com/errata/RHSA-2024:3500
RHSA-2024:3546 https://access.redhat.com/errata/RHSA-2024:3546
RHSA-2024:3668 https://access.redhat.com/errata/RHSA-2024:3668
RHSA-2024:3670 https://access.redhat.com/errata/RHSA-2024:3670
RHSA-2024:3671 https://access.redhat.com/errata/RHSA-2024:3671
RHSA-2024:3838 https://access.redhat.com/errata/RHSA-2024:3838
RHSA-2024:4499 https://access.redhat.com/errata/RHSA-2024:4499
USN-6838-1 https://usn.ubuntu.com/6838-1/
USN-6838-2 https://usn.ubuntu.com/6838-2/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27281.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/1254b0066f312ddbf7fae7a195e66ce5b3bc6656
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/32ff6ba0bebd8ea26f569da5fd23be2937f6a644
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/48617985e9fbc2825219d55f04e3e0e98d2923be
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/811f125a4a0cc968e3eb18e16ea6c1a3b49a11bf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/a5de13bf0f0c26f8e764e82b5bf4bf8bffc7198e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/d22ba930f1f611dda531dba04cd3d2531bb3f8a5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/da7a0c7553ef7250ca665a3fecdc01dbaacbb43d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/ruby/rdoc/commit/e4a0e71e6f1032f8b4e5e58b4ef60d702c22ce17
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2024-27281.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://hackerone.com/reports/1187477
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-20T13:50:49Z/ Found at https://hackerone.com/reports/1187477
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2024-27281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-20T13:50:49Z/ Found at https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
Exploit Prediction Scoring System (EPSS)
Percentile 0.33257
EPSS Score 0.00126
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2024-04-23T17:41:31.939520+00:00 GHSA Importer Import https://github.com/advisories/GHSA-592j-995h-p23j 34.0.0rc4