Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-9uh8-upzm-7bgd
Vulnerability ID VCID-9uh8-upzm-7bgd
Aliases CVE-2013-0184
GHSA-v882-ccj6-jc48
OSV-89327
Summary Uncontrolled Resource Consumption Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings."
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual MODERATE http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-0544.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-0548.html
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2013:0544
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2013:0548
generic_textual MODERATE https://access.redhat.com/security/cve/CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
epss 0.00677 https://api.first.org/data/v1/epss?cve=CVE-2013-0184
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=895384
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-v882-ccj6-jc48
generic_textual MODERATE https://github.com/rack/rack
generic_textual MODERATE https://github.com/rack/rack/commit/1f61549529d07abd4aa512b8320ab0e97dcacc5d
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2013-0184
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2013-0184
generic_textual MODERATE http://www.debian.org/security/2013/dsa-2783
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
http://rhn.redhat.com/errata/RHSA-2013-0544.html
http://rhn.redhat.com/errata/RHSA-2013-0548.html
https://access.redhat.com/errata/RHSA-2013:0544
https://access.redhat.com/errata/RHSA-2013:0548
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0184.json
https://access.redhat.com/security/cve/CVE-2013-0184
https://api.first.org/data/v1/epss?cve=CVE-2013-0184
https://bugzilla.redhat.com/show_bug.cgi?id=895384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0184
https://github.com/rack/rack
https://github.com/rack/rack/commit/1f61549529d07abd4aa512b8320ab0e97dcacc5d
http://www.debian.org/security/2013/dsa-2783
698440 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698440
cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
CVE-2013-0184 https://nvd.nist.gov/vuln/detail/CVE-2013-0184
GHSA-v882-ccj6-jc48 https://github.com/advisories/GHSA-v882-ccj6-jc48
GLSA-201405-10 https://security.gentoo.org/glsa/201405-10
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-0184
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.71463
EPSS Score 0.00677
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:46:48.396941+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rack/CVE-2013-0184.yml 38.0.0