Search for vulnerabilities
Vulnerability details: VCID-brt9-hn4z-33fq
System Score Found at
generic_textual MODERATE http://advisories.mageia.org/MGASA-2014-0148.html
generic_textual MODERATE http://marc.info/?l=bugtraq&m=144498216801440&w=2
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
epss 0.01173 https://api.first.org/data/v1/epss?cve=CVE-2013-4590
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=1069911
apache_tomcat Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-87w9-x2c3-hrjj
generic_textual MODERATE https://github.com/apache/tomcat
generic_textual MODERATE https://github.com/apache/tomcat/commit/05c84ff8304a69a30b251f207a7b93c2c882564d
generic_textual MODERATE https://github.com/apache/tomcat/commit/78dd7e6f3d8481bc3bcd71ca5b20296de1283888
generic_textual MODERATE https://github.com/apache/tomcat/commit/b9e06ead01984483af73f48e7861bc7897f5e84f
generic_textual MODERATE https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
generic_textual MODERATE https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2013-4590
generic_textual MODERATE http://svn.apache.org/viewvc?view=revision&revision=1549528
generic_textual MODERATE http://svn.apache.org/viewvc?view=revision&revision=1549529
generic_textual MODERATE http://svn.apache.org/viewvc?view=revision&revision=1558828
generic_textual MODERATE http://tomcat.apache.org/security-6.html
generic_textual MODERATE http://tomcat.apache.org/security-7.html
generic_textual MODERATE http://tomcat.apache.org/security-8.html
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg21667883
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg21675886
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg21677147
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg21678231
generic_textual MODERATE http://www.debian.org/security/2016/dsa-3530
generic_textual MODERATE http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
generic_textual MODERATE http://www.vmware.com/security/advisories/VMSA-2014-0008.html
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=144498216801440&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4590.json
https://api.first.org/data/v1/epss?cve=CVE-2013-4590
https://bugzilla.redhat.com/show_bug.cgi?id=1069911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
https://github.com/apache/tomcat
https://github.com/apache/tomcat70/commit/b9e06ead01984483af73f48e7861bc7897f5e84f
https://github.com/apache/tomcat/commit/05c84ff8304a69a30b251f207a7b93c2c882564d
https://github.com/apache/tomcat/commit/78dd7e6f3d8481bc3bcd71ca5b20296de1283888
https://github.com/apache/tomcat/commit/b9e06ead01984483af73f48e7861bc7897f5e84f
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4590
https://svn.apache.org/viewvc?view=rev&rev=1549528
https://svn.apache.org/viewvc?view=rev&rev=1549529
https://svn.apache.org/viewvc?view=rev&rev=1558828
http://svn.apache.org/viewvc?view=revision&revision=1549528
http://svn.apache.org/viewvc?view=revision&revision=1549529
http://svn.apache.org/viewvc?view=revision&revision=1558828
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
GHSA-87w9-x2c3-hrjj https://github.com/advisories/GHSA-87w9-x2c3-hrjj
RHSA-2014:1038 https://access.redhat.com/errata/RHSA-2014:1038
RHSA-2014:1086 https://access.redhat.com/errata/RHSA-2014:1086
RHSA-2014:1087 https://access.redhat.com/errata/RHSA-2014:1087
RHSA-2014:1088 https://access.redhat.com/errata/RHSA-2014:1088
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.77723
EPSS Score 0.01173
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T11:55:19.254693+00:00 ProjectKB MSRImporter Import https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv 36.1.3