Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/ruby@1.8.5-27?arch=el5
Typerpm
Namespaceredhat
Nameruby
Version1.8.5-27
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3kkj-nt28-8qg6
vulnerability_id VCID-3kkj-nt28-8qg6
summary
Multiple vulnerabilities have been found in Ruby, allowing
    context-dependent attackers to cause a Denial of Service condition.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0129.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0129.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0612.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0612.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4481.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4481.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4481
reference_id
reference_type
scores
0
value 0.00488
scoring_system epss
scoring_elements 0.6551
published_at 2026-04-21T12:55:00Z
1
value 0.00488
scoring_system epss
scoring_elements 0.65525
published_at 2026-04-18T12:55:00Z
2
value 0.00488
scoring_system epss
scoring_elements 0.65395
published_at 2026-04-01T12:55:00Z
3
value 0.00488
scoring_system epss
scoring_elements 0.65443
published_at 2026-04-02T12:55:00Z
4
value 0.00488
scoring_system epss
scoring_elements 0.65471
published_at 2026-04-04T12:55:00Z
5
value 0.00488
scoring_system epss
scoring_elements 0.65435
published_at 2026-04-07T12:55:00Z
6
value 0.00488
scoring_system epss
scoring_elements 0.65488
published_at 2026-04-08T12:55:00Z
7
value 0.00488
scoring_system epss
scoring_elements 0.655
published_at 2026-04-09T12:55:00Z
8
value 0.00488
scoring_system epss
scoring_elements 0.65518
published_at 2026-04-11T12:55:00Z
9
value 0.00488
scoring_system epss
scoring_elements 0.65505
published_at 2026-04-12T12:55:00Z
10
value 0.00488
scoring_system epss
scoring_elements 0.65477
published_at 2026-04-13T12:55:00Z
11
value 0.00488
scoring_system epss
scoring_elements 0.65513
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4481
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:C/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:124
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:124
7
reference_url http://www.openwall.com/lists/oss-security/2012/10/05/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/05/2
8
reference_url http://www.openwall.com/lists/oss-security/2012/10/05/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/05/4
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=863484
reference_id 863484
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=863484
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4481
reference_id CVE-2012-4481
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4481
12
reference_url https://security.gentoo.org/glsa/201412-27
reference_id GLSA-201412-27
reference_type
scores
url https://security.gentoo.org/glsa/201412-27
13
reference_url https://access.redhat.com/errata/RHSA-2013:0129
reference_id RHSA-2013:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0129
14
reference_url https://access.redhat.com/errata/RHSA-2013:0612
reference_id RHSA-2013:0612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0612
15
reference_url https://usn.ubuntu.com/1603-1/
reference_id USN-1603-1
reference_type
scores
url https://usn.ubuntu.com/1603-1/
16
reference_url https://usn.ubuntu.com/1603-2/
reference_id USN-1603-2
reference_type
scores
url https://usn.ubuntu.com/1603-2/
fixed_packages
aliases CVE-2012-4481
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kkj-nt28-8qg6
1
url VCID-hunm-dpcd-r3ff
vulnerability_id VCID-hunm-dpcd-r3ff
summary ruby: unintentional file creation caused by inserting an illegal NUL character
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090235.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090235.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090515.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090515.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0129.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0129.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4522.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4522.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4522
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57347
published_at 2026-04-21T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57238
published_at 2026-04-01T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.5732
published_at 2026-04-02T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57343
published_at 2026-04-04T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57319
published_at 2026-04-07T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57371
published_at 2026-04-08T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57373
published_at 2026-04-16T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57388
published_at 2026-04-11T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57368
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4522
5
reference_url http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
reference_id
reference_type
scores
url http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
6
reference_url https://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability
7
reference_url http://www.openwall.com/lists/oss-security/2012/10/12/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/12/6
8
reference_url http://www.openwall.com/lists/oss-security/2012/10/13/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/13/1
9
reference_url http://www.openwall.com/lists/oss-security/2012/10/16/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/10/16/1
10
reference_url http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=865940
reference_id 865940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=865940
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4522
reference_id CVE-2012-4522
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4522
15
reference_url https://access.redhat.com/errata/RHSA-2013:0129
reference_id RHSA-2013:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0129
16
reference_url https://usn.ubuntu.com/1614-1/
reference_id USN-1614-1
reference_type
scores
url https://usn.ubuntu.com/1614-1/
fixed_packages
aliases CVE-2012-4522, GHSA-6mch-f8jc-rpmr, OSV-87917
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hunm-dpcd-r3ff
Fixing_vulnerabilities
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.5-27%3Farch=el5