Low severityNVD Advisory· Published Jan 10, 2014· Updated Apr 29, 2026
CVE-2014-1234
CVE-2014-1234
Description
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
paratrooper-newrelicRubyGems | <= 1.0.1 | — |
Affected products
1- cpe:2.3:a:paratrooper-newrelic_project:paratrooper-newrelic:1.0.1:-:-:*:-:ruby:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- openwall.com/lists/oss-security/2014/01/08/2nvdExploitWEB
- www.vapid.dhs.org/advisories/paratrooper-newrelic-api.htmlnvdExploitWEB
- github.com/advisories/GHSA-959j-5g9v-3fpqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-1234ghsaADVISORY
- github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-newrelic/CVE-2014-1234.ymlghsaWEB
News mentions
0No linked articles in our index yet.