Lookup for vulnerable packages by Package URL.

Purlpkg:gem/activerecord@4.2.7.0
Typegem
Namespace
Nameactiverecord
Version4.2.7.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version7.1.5.2
Latest_non_vulnerable_version8.0.2.1
Affected_by_vulnerabilities
0
url VCID-9t7a-muwx-zyee
vulnerability_id VCID-9t7a-muwx-zyee
summary
Improper Access Control
The Rails gem does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing `WHERE` clauses via a crafted request.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1855.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-1855.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6317.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6317.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6317
reference_id
reference_type
scores
0
value 0.00381
scoring_system epss
scoring_elements 0.59551
published_at 2026-04-16T12:55:00Z
1
value 0.00381
scoring_system epss
scoring_elements 0.59517
published_at 2026-04-13T12:55:00Z
2
value 0.00381
scoring_system epss
scoring_elements 0.59536
published_at 2026-04-12T12:55:00Z
3
value 0.00381
scoring_system epss
scoring_elements 0.59478
published_at 2026-04-02T12:55:00Z
4
value 0.00381
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-21T12:55:00Z
5
value 0.00381
scoring_system epss
scoring_elements 0.59558
published_at 2026-04-18T12:55:00Z
6
value 0.00381
scoring_system epss
scoring_elements 0.59521
published_at 2026-04-08T12:55:00Z
7
value 0.00381
scoring_system epss
scoring_elements 0.5947
published_at 2026-04-07T12:55:00Z
8
value 0.00381
scoring_system epss
scoring_elements 0.59503
published_at 2026-04-04T12:55:00Z
9
value 0.00381
scoring_system epss
scoring_elements 0.59406
published_at 2026-04-01T12:55:00Z
10
value 0.00381
scoring_system epss
scoring_elements 0.59552
published_at 2026-04-11T12:55:00Z
11
value 0.00381
scoring_system epss
scoring_elements 0.59533
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6317
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6317
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2016-6317.yml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2016-6317.yml
6
reference_url https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s
7
reference_url https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA
8
reference_url http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released
9
reference_url http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/
reference_id
reference_type
scores
url http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/
10
reference_url http://www.openwall.com/lists/oss-security/2016/08/11/4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/08/11/4
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1365017
reference_id 1365017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1365017
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834154
reference_id 834154
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834154
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6317
reference_id CVE-2016-6317
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6317
14
reference_url https://github.com/advisories/GHSA-pr3r-4wrp-r2pv
reference_id GHSA-pr3r-4wrp-r2pv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pr3r-4wrp-r2pv
15
reference_url https://access.redhat.com/errata/RHSA-2016:1855
reference_id RHSA-2016:1855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1855
fixed_packages
0
url pkg:gem/activerecord@4.2.7.1
purl pkg:gem/activerecord@4.2.7.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4cky-r218-dkbb
1
vulnerability VCID-5qu2-b8gt-7qe3
2
vulnerability VCID-bsxw-gh14-rbef
3
vulnerability VCID-j8zg-kq3z-jqcm
4
vulnerability VCID-n8r7-wthv-fqaj
5
vulnerability VCID-nzeb-cy9e-tkax
6
vulnerability VCID-sygb-mygd-s3gb
7
vulnerability VCID-y54w-a8kr-suhy
8
vulnerability VCID-zqzx-avvt-wkhm
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/activerecord@4.2.7.1
aliases CVE-2016-6317, GHSA-pr3r-4wrp-r2pv
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9t7a-muwx-zyee
1
url VCID-qywc-5pj5-y3a9
vulnerability_id VCID-qywc-5pj5-y3a9
summary
Moderate severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish.

Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
references
0
reference_url https://github.com/advisories/GHSA-m8h6-m9p5-p2f8
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-m8h6-m9p5-p2f8
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6317
reference_id CVE-2016-6317
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-6317
fixed_packages
0
url pkg:gem/activerecord@4.2.7.1
purl pkg:gem/activerecord@4.2.7.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4cky-r218-dkbb
1
vulnerability VCID-5qu2-b8gt-7qe3
2
vulnerability VCID-bsxw-gh14-rbef
3
vulnerability VCID-j8zg-kq3z-jqcm
4
vulnerability VCID-n8r7-wthv-fqaj
5
vulnerability VCID-nzeb-cy9e-tkax
6
vulnerability VCID-sygb-mygd-s3gb
7
vulnerability VCID-y54w-a8kr-suhy
8
vulnerability VCID-zqzx-avvt-wkhm
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/activerecord@4.2.7.1
aliases GHSA-m8h6-m9p5-p2f8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qywc-5pj5-y3a9
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/activerecord@4.2.7.0