Low severityNVD Advisory· Published Jan 10, 2014· Updated Apr 29, 2026
CVE-2014-1233
CVE-2014-1233
Description
The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
paratrooper-pingdomRubyGems | <= 1.0.0 | — |
Affected products
1- cpe:2.3:a:tobias_maier:paratrooper-pingdom:1.0.0:-:-:*:-:ruby:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- openwall.com/lists/oss-security/2014/01/08/1nvdExploitWEB
- www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.htmlnvdExploitWEB
- github.com/advisories/GHSA-fqrr-rrwg-69pvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-1233ghsaADVISORY
- github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-pingdom/CVE-2014-1233.ymlghsaWEB
News mentions
0No linked articles in our index yet.