Vulnerability Details CVE-2015-3448
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 20.6%
CVSS Severity
CVSS v2 Score 2.1
Products affected by CVE-2015-3448
-
cpe:2.3:a:rest-client_project:rest-client:0.1
-
cpe:2.3:a:rest-client_project:rest-client:0.2
-
cpe:2.3:a:rest-client_project:rest-client:0.3
-
cpe:2.3:a:rest-client_project:rest-client:0.4
-
cpe:2.3:a:rest-client_project:rest-client:0.5
-
cpe:2.3:a:rest-client_project:rest-client:0.5.1
-
cpe:2.3:a:rest-client_project:rest-client:0.6
-
cpe:2.3:a:rest-client_project:rest-client:0.6.1
-
cpe:2.3:a:rest-client_project:rest-client:0.6.2
-
cpe:2.3:a:rest-client_project:rest-client:0.7
-
cpe:2.3:a:rest-client_project:rest-client:0.8
-
cpe:2.3:a:rest-client_project:rest-client:0.8.1
-
cpe:2.3:a:rest-client_project:rest-client:0.8.2
-
cpe:2.3:a:rest-client_project:rest-client:0.9
-
cpe:2.3:a:rest-client_project:rest-client:0.9.2
-
cpe:2.3:a:rest-client_project:rest-client:1.0
-
cpe:2.3:a:rest-client_project:rest-client:1.0.1
-
cpe:2.3:a:rest-client_project:rest-client:1.0.2
-
cpe:2.3:a:rest-client_project:rest-client:1.0.3
-
cpe:2.3:a:rest-client_project:rest-client:1.0.4
-
cpe:2.3:a:rest-client_project:rest-client:1.1.0
-
cpe:2.3:a:rest-client_project:rest-client:1.2.0
-
cpe:2.3:a:rest-client_project:rest-client:1.3.0
-
cpe:2.3:a:rest-client_project:rest-client:1.3.1
-
cpe:2.3:a:rest-client_project:rest-client:1.4.0
-
cpe:2.3:a:rest-client_project:rest-client:1.4.1
-
cpe:2.3:a:rest-client_project:rest-client:1.4.2
-
cpe:2.3:a:rest-client_project:rest-client:1.5.0
-
cpe:2.3:a:rest-client_project:rest-client:1.5.1
-
cpe:2.3:a:rest-client_project:rest-client:1.6.0
-
cpe:2.3:a:rest-client_project:rest-client:1.6.1
-
cpe:2.3:a:rest-client_project:rest-client:1.6.10
-
cpe:2.3:a:rest-client_project:rest-client:1.6.11
-
cpe:2.3:a:rest-client_project:rest-client:1.6.12
-
cpe:2.3:a:rest-client_project:rest-client:1.6.13
-
cpe:2.3:a:rest-client_project:rest-client:1.6.14
-
cpe:2.3:a:rest-client_project:rest-client:1.6.2
-
cpe:2.3:a:rest-client_project:rest-client:1.6.3
-
cpe:2.3:a:rest-client_project:rest-client:1.6.5
-
cpe:2.3:a:rest-client_project:rest-client:1.6.6
-
cpe:2.3:a:rest-client_project:rest-client:1.6.7
-
cpe:2.3:a:rest-client_project:rest-client:1.6.8
-
cpe:2.3:a:rest-client_project:rest-client:1.6.9
-
cpe:2.3:a:rest-client_project:rest-client:1.7.0
-
cpe:2.3:a:rest-client_project:rest-client:1.7.1
-
cpe:2.3:a:rest-client_project:rest-client:1.7.2