Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
Typedeb
Namespacedebian
Namejruby
Version9.3.9.0+ds-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.4.5.0+ds-1
Latest_non_vulnerable_version9.4.8.0+ds-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1cad-uybu-2uau
vulnerability_id VCID-1cad-uybu-2uau
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17742.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17742
reference_id
reference_type
scores
0
value 0.01152
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-29T12:55:00Z
1
value 0.01152
scoring_system epss
scoring_elements 0.78524
published_at 2026-04-21T12:55:00Z
2
value 0.01152
scoring_system epss
scoring_elements 0.78556
published_at 2026-04-24T12:55:00Z
3
value 0.01152
scoring_system epss
scoring_elements 0.78564
published_at 2026-04-26T12:55:00Z
4
value 0.01152
scoring_system epss
scoring_elements 0.7845
published_at 2026-04-01T12:55:00Z
5
value 0.01152
scoring_system epss
scoring_elements 0.78456
published_at 2026-04-02T12:55:00Z
6
value 0.01152
scoring_system epss
scoring_elements 0.78487
published_at 2026-04-04T12:55:00Z
7
value 0.01152
scoring_system epss
scoring_elements 0.7847
published_at 2026-04-07T12:55:00Z
8
value 0.01152
scoring_system epss
scoring_elements 0.78497
published_at 2026-04-08T12:55:00Z
9
value 0.01152
scoring_system epss
scoring_elements 0.78502
published_at 2026-04-09T12:55:00Z
10
value 0.01152
scoring_system epss
scoring_elements 0.78527
published_at 2026-04-18T12:55:00Z
11
value 0.01152
scoring_system epss
scoring_elements 0.78508
published_at 2026-04-12T12:55:00Z
12
value 0.01152
scoring_system epss
scoring_elements 0.785
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17742
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-17742
19
reference_url https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561952
reference_id 1561952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561952
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
reference_id 972230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
22
reference_url https://access.redhat.com/errata/RHSA-2020:1963
reference_id RHSA-2020:1963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1963
23
reference_url https://access.redhat.com/errata/RHSA-2020:2212
reference_id RHSA-2020:2212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2212
24
reference_url https://access.redhat.com/errata/RHSA-2020:2288
reference_id RHSA-2020:2288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2288
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2017-17742, GHSA-7p4c-jf2w-hc3w
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cad-uybu-2uau
1
url VCID-f6d8-e8tp-c3am
vulnerability_id VCID-f6d8-e8tp-c3am
summary
Multiple vulnerabilities have been found in Ruby, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16255.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16255
reference_id
reference_type
scores
0
value 0.01157
scoring_system epss
scoring_elements 0.78518
published_at 2026-04-01T12:55:00Z
1
value 0.01157
scoring_system epss
scoring_elements 0.78648
published_at 2026-04-29T12:55:00Z
2
value 0.01157
scoring_system epss
scoring_elements 0.78595
published_at 2026-04-16T12:55:00Z
3
value 0.01157
scoring_system epss
scoring_elements 0.78592
published_at 2026-04-21T12:55:00Z
4
value 0.01157
scoring_system epss
scoring_elements 0.78623
published_at 2026-04-24T12:55:00Z
5
value 0.01157
scoring_system epss
scoring_elements 0.78631
published_at 2026-04-26T12:55:00Z
6
value 0.01157
scoring_system epss
scoring_elements 0.78524
published_at 2026-04-02T12:55:00Z
7
value 0.01157
scoring_system epss
scoring_elements 0.78555
published_at 2026-04-04T12:55:00Z
8
value 0.01157
scoring_system epss
scoring_elements 0.78538
published_at 2026-04-07T12:55:00Z
9
value 0.01157
scoring_system epss
scoring_elements 0.78564
published_at 2026-04-08T12:55:00Z
10
value 0.01157
scoring_system epss
scoring_elements 0.7857
published_at 2026-04-09T12:55:00Z
11
value 0.01157
scoring_system epss
scoring_elements 0.78594
published_at 2026-04-18T12:55:00Z
12
value 0.01157
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-12T12:55:00Z
13
value 0.01157
scoring_system epss
scoring_elements 0.78567
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16255
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16255
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16255
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1793683
reference_id 1793683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1793683
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
reference_id 972230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
10
reference_url https://security.archlinux.org/ASA-201910-2
reference_id ASA-201910-2
reference_type
scores
url https://security.archlinux.org/ASA-201910-2
11
reference_url https://security.archlinux.org/AVG-1039
reference_id AVG-1039
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1039
12
reference_url https://security.gentoo.org/glsa/202003-06
reference_id GLSA-202003-06
reference_type
scores
url https://security.gentoo.org/glsa/202003-06
13
reference_url https://access.redhat.com/errata/RHSA-2021:2104
reference_id RHSA-2021:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2104
14
reference_url https://access.redhat.com/errata/RHSA-2021:2230
reference_id RHSA-2021:2230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2230
15
reference_url https://access.redhat.com/errata/RHSA-2021:2587
reference_id RHSA-2021:2587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2587
16
reference_url https://access.redhat.com/errata/RHSA-2021:2588
reference_id RHSA-2021:2588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2588
17
reference_url https://access.redhat.com/errata/RHSA-2022:0581
reference_id RHSA-2022:0581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0581
18
reference_url https://access.redhat.com/errata/RHSA-2022:0582
reference_id RHSA-2022:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0582
19
reference_url https://usn.ubuntu.com/4201-1/
reference_id USN-4201-1
reference_type
scores
url https://usn.ubuntu.com/4201-1/
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2019-16255, GHSA-ph7w-p94x-9vvw
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6d8-e8tp-c3am
2
url VCID-kp26-vpgn-k7az
vulnerability_id VCID-kp26-vpgn-k7az
summary
Multiple vulnerabilities have been found in Ruby, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16201
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69541
published_at 2026-04-01T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69703
published_at 2026-04-29T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.6969
published_at 2026-04-24T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69698
published_at 2026-04-26T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69553
published_at 2026-04-02T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69568
published_at 2026-04-04T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69547
published_at 2026-04-07T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69598
published_at 2026-04-08T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69615
published_at 2026-04-09T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.69637
published_at 2026-04-21T12:55:00Z
10
value 0.00605
scoring_system epss
scoring_elements 0.69622
published_at 2026-04-12T12:55:00Z
11
value 0.00605
scoring_system epss
scoring_elements 0.69608
published_at 2026-04-13T12:55:00Z
12
value 0.00605
scoring_system epss
scoring_elements 0.69648
published_at 2026-04-16T12:55:00Z
13
value 0.00605
scoring_system epss
scoring_elements 0.69656
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1773728
reference_id 1773728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1773728
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
reference_id 972230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
10
reference_url https://security.archlinux.org/ASA-201910-2
reference_id ASA-201910-2
reference_type
scores
url https://security.archlinux.org/ASA-201910-2
11
reference_url https://security.archlinux.org/AVG-1039
reference_id AVG-1039
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1039
12
reference_url https://security.gentoo.org/glsa/202003-06
reference_id GLSA-202003-06
reference_type
scores
url https://security.gentoo.org/glsa/202003-06
13
reference_url https://access.redhat.com/errata/RHSA-2021:2104
reference_id RHSA-2021:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2104
14
reference_url https://access.redhat.com/errata/RHSA-2021:2230
reference_id RHSA-2021:2230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2230
15
reference_url https://access.redhat.com/errata/RHSA-2021:2587
reference_id RHSA-2021:2587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2587
16
reference_url https://access.redhat.com/errata/RHSA-2021:2588
reference_id RHSA-2021:2588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2588
17
reference_url https://access.redhat.com/errata/RHSA-2022:0581
reference_id RHSA-2022:0581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0581
18
reference_url https://access.redhat.com/errata/RHSA-2022:0582
reference_id RHSA-2022:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0582
19
reference_url https://usn.ubuntu.com/4201-1/
reference_id USN-4201-1
reference_type
scores
url https://usn.ubuntu.com/4201-1/
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2019-16201
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kp26-vpgn-k7az
3
url VCID-t9y5-hd9b-bkc4
vulnerability_id VCID-t9y5-hd9b-bkc4
summary Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31810.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31810
reference_id
reference_type
scores
0
value 0.00632
scoring_system epss
scoring_elements 0.70265
published_at 2026-04-01T12:55:00Z
1
value 0.00632
scoring_system epss
scoring_elements 0.70419
published_at 2026-04-29T12:55:00Z
2
value 0.00632
scoring_system epss
scoring_elements 0.7037
published_at 2026-04-16T12:55:00Z
3
value 0.00632
scoring_system epss
scoring_elements 0.70379
published_at 2026-04-18T12:55:00Z
4
value 0.00632
scoring_system epss
scoring_elements 0.7036
published_at 2026-04-21T12:55:00Z
5
value 0.00632
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-24T12:55:00Z
6
value 0.00632
scoring_system epss
scoring_elements 0.7042
published_at 2026-04-26T12:55:00Z
7
value 0.00632
scoring_system epss
scoring_elements 0.70277
published_at 2026-04-02T12:55:00Z
8
value 0.00632
scoring_system epss
scoring_elements 0.70295
published_at 2026-04-04T12:55:00Z
9
value 0.00632
scoring_system epss
scoring_elements 0.70271
published_at 2026-04-07T12:55:00Z
10
value 0.00632
scoring_system epss
scoring_elements 0.70316
published_at 2026-04-08T12:55:00Z
11
value 0.00632
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-09T12:55:00Z
12
value 0.00632
scoring_system epss
scoring_elements 0.70354
published_at 2026-04-11T12:55:00Z
13
value 0.00632
scoring_system epss
scoring_elements 0.70339
published_at 2026-04-12T12:55:00Z
14
value 0.00632
scoring_system epss
scoring_elements 0.70326
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-31810
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements
1
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2021-31810
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014818
reference_id 1014818
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014818
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1980126
reference_id 1980126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1980126
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990815
reference_id 990815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990815
13
reference_url https://security.archlinux.org/ASA-202107-23
reference_id ASA-202107-23
reference_type
scores
url https://security.archlinux.org/ASA-202107-23
14
reference_url https://security.archlinux.org/AVG-1906
reference_id AVG-1906
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1906
15
reference_url https://security.archlinux.org/AVG-2138
reference_id AVG-2138
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2138
16
reference_url https://access.redhat.com/errata/RHSA-2021:3020
reference_id RHSA-2021:3020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3020
17
reference_url https://access.redhat.com/errata/RHSA-2021:3559
reference_id RHSA-2021:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3559
18
reference_url https://access.redhat.com/errata/RHSA-2021:3982
reference_id RHSA-2021:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3982
19
reference_url https://access.redhat.com/errata/RHSA-2022:0543
reference_id RHSA-2022:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0543
20
reference_url https://access.redhat.com/errata/RHSA-2022:0544
reference_id RHSA-2022:0544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0544
21
reference_url https://access.redhat.com/errata/RHSA-2022:0581
reference_id RHSA-2022:0581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0581
22
reference_url https://access.redhat.com/errata/RHSA-2022:0582
reference_id RHSA-2022:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0582
23
reference_url https://access.redhat.com/errata/RHSA-2022:0672
reference_id RHSA-2022:0672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0672
24
reference_url https://access.redhat.com/errata/RHSA-2022:0708
reference_id RHSA-2022:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0708
25
reference_url https://access.redhat.com/errata/RHSA-2026:7305
reference_id RHSA-2026:7305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7305
26
reference_url https://access.redhat.com/errata/RHSA-2026:7307
reference_id RHSA-2026:7307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7307
27
reference_url https://access.redhat.com/errata/RHSA-2026:8838
reference_id RHSA-2026:8838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8838
28
reference_url https://usn.ubuntu.com/5020-1/
reference_id USN-5020-1
reference_type
scores
url https://usn.ubuntu.com/5020-1/
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2021-31810, GHSA-wr95-679j-87v9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9y5-hd9b-bkc4
4
url VCID-vcz9-dvf4-47am
vulnerability_id VCID-vcz9-dvf4-47am
summary Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25613.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25613.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25613
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-29T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50562
published_at 2026-04-26T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50554
published_at 2026-04-24T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50605
published_at 2026-04-21T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50627
published_at 2026-04-18T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50623
published_at 2026-04-16T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50581
published_at 2026-04-13T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50595
published_at 2026-04-12T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50618
published_at 2026-04-11T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50575
published_at 2026-04-09T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50579
published_at 2026-04-08T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50524
published_at 2026-04-07T12:55:00Z
12
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-04T12:55:00Z
13
value 0.00271
scoring_system epss
scoring_elements 0.50544
published_at 2026-04-02T12:55:00Z
14
value 0.00271
scoring_system epss
scoring_elements 0.50487
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25613
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webrick/CVE-2020-25613.yml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webrick/CVE-2020-25613.yml
5
reference_url https://github.com/ruby/webrick
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/webrick
6
reference_url https://github.com/ruby/webrick/commit/076ac636bf48b7a492887ce4de7041de23e6c00d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/webrick/commit/076ac636bf48b7a492887ce4de7041de23e6c00d
7
reference_url https://github.com/ruby/webrick/commit/7618049fa57ddad2efff2a7bc7dad7d2d8a311b1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/webrick/commit/7618049fa57ddad2efff2a7bc7dad7d2d8a311b1
8
reference_url https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7
9
reference_url https://github.com/ruby/webrick/commit/af2efdcdf826f25592202d187c53963e7932e4b9
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/webrick/commit/af2efdcdf826f25592202d187c53963e7932e4b9
10
reference_url https://hackerone.com/reports/965267
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/965267
11
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFP3E7KXXT3H3KA6CBZPUOGA5VPFARRJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFP3E7KXXT3H3KA6CBZPUOGA5VPFARRJ
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFP3E7KXXT3H3KA6CBZPUOGA5VPFARRJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFP3E7KXXT3H3KA6CBZPUOGA5VPFARRJ
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25613
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25613
17
reference_url https://security.gentoo.org/glsa/202401-27
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202401-27
18
reference_url https://security.netapp.com/advisory/ntap-20210115-0008
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210115-0008
19
reference_url https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613
20
reference_url https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1883623
reference_id 1883623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1883623
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
reference_id 972230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
23
reference_url https://github.com/advisories/GHSA-gwfg-cqmg-cf8f
reference_id GHSA-gwfg-cqmg-cf8f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gwfg-cqmg-cf8f
24
reference_url https://access.redhat.com/errata/RHSA-2021:2104
reference_id RHSA-2021:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2104
25
reference_url https://access.redhat.com/errata/RHSA-2021:2229
reference_id RHSA-2021:2229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2229
26
reference_url https://access.redhat.com/errata/RHSA-2021:2230
reference_id RHSA-2021:2230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2230
27
reference_url https://access.redhat.com/errata/RHSA-2021:2584
reference_id RHSA-2021:2584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2584
28
reference_url https://access.redhat.com/errata/RHSA-2021:2587
reference_id RHSA-2021:2587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2587
29
reference_url https://access.redhat.com/errata/RHSA-2021:2588
reference_id RHSA-2021:2588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2588
30
reference_url https://access.redhat.com/errata/RHSA-2022:0581
reference_id RHSA-2022:0581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0581
31
reference_url https://access.redhat.com/errata/RHSA-2022:0582
reference_id RHSA-2022:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0582
32
reference_url https://access.redhat.com/errata/RHSA-2026:7305
reference_id RHSA-2026:7305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7305
33
reference_url https://access.redhat.com/errata/RHSA-2026:7307
reference_id RHSA-2026:7307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7307
34
reference_url https://access.redhat.com/errata/RHSA-2026:8838
reference_id RHSA-2026:8838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8838
35
reference_url https://usn.ubuntu.com/4882-1/
reference_id USN-4882-1
reference_type
scores
url https://usn.ubuntu.com/4882-1/
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2020-25613, GHSA-gwfg-cqmg-cf8f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcz9-dvf4-47am
5
url VCID-xkby-43zv-x3f7
vulnerability_id VCID-xkby-43zv-x3f7
summary Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32066.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32066
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22303
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22157
published_at 2026-04-29T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22381
published_at 2026-04-16T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22378
published_at 2026-04-18T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22327
published_at 2026-04-21T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22177
published_at 2026-04-24T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22164
published_at 2026-04-26T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22468
published_at 2026-04-02T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22514
published_at 2026-04-04T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22302
published_at 2026-04-07T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22384
published_at 2026-04-08T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-09T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.2246
published_at 2026-04-11T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22419
published_at 2026-04-12T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22364
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32066
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2021-32066
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014818
reference_id 1014818
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014818
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1980128
reference_id 1980128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1980128
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990815
reference_id 990815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990815
13
reference_url https://security.archlinux.org/ASA-202107-23
reference_id ASA-202107-23
reference_type
scores
url https://security.archlinux.org/ASA-202107-23
14
reference_url https://security.archlinux.org/AVG-1906
reference_id AVG-1906
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1906
15
reference_url https://security.archlinux.org/AVG-2138
reference_id AVG-2138
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2138
16
reference_url https://access.redhat.com/errata/RHSA-2021:3020
reference_id RHSA-2021:3020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3020
17
reference_url https://access.redhat.com/errata/RHSA-2021:3559
reference_id RHSA-2021:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3559
18
reference_url https://access.redhat.com/errata/RHSA-2021:3982
reference_id RHSA-2021:3982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3982
19
reference_url https://access.redhat.com/errata/RHSA-2022:0543
reference_id RHSA-2022:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0543
20
reference_url https://access.redhat.com/errata/RHSA-2022:0544
reference_id RHSA-2022:0544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0544
21
reference_url https://access.redhat.com/errata/RHSA-2022:0581
reference_id RHSA-2022:0581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0581
22
reference_url https://access.redhat.com/errata/RHSA-2022:0582
reference_id RHSA-2022:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0582
23
reference_url https://access.redhat.com/errata/RHSA-2022:0672
reference_id RHSA-2022:0672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0672
24
reference_url https://access.redhat.com/errata/RHSA-2022:0708
reference_id RHSA-2022:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0708
25
reference_url https://usn.ubuntu.com/5020-1/
reference_id USN-5020-1
reference_type
scores
url https://usn.ubuntu.com/5020-1/
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2021-32066, GHSA-gx49-h5r3-q3xj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xkby-43zv-x3f7
6
url VCID-y56y-5am7-wkhr
vulnerability_id VCID-y56y-5am7-wkhr
summary
Multiple vulnerabilities have been found in Ruby, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16254.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16254
reference_id
reference_type
scores
0
value 0.00707
scoring_system epss
scoring_elements 0.72109
published_at 2026-04-01T12:55:00Z
1
value 0.00707
scoring_system epss
scoring_elements 0.72235
published_at 2026-04-29T12:55:00Z
2
value 0.00707
scoring_system epss
scoring_elements 0.72204
published_at 2026-04-18T12:55:00Z
3
value 0.00707
scoring_system epss
scoring_elements 0.72189
published_at 2026-04-21T12:55:00Z
4
value 0.00707
scoring_system epss
scoring_elements 0.72232
published_at 2026-04-24T12:55:00Z
5
value 0.00707
scoring_system epss
scoring_elements 0.72241
published_at 2026-04-26T12:55:00Z
6
value 0.00707
scoring_system epss
scoring_elements 0.72115
published_at 2026-04-02T12:55:00Z
7
value 0.00707
scoring_system epss
scoring_elements 0.72135
published_at 2026-04-04T12:55:00Z
8
value 0.00707
scoring_system epss
scoring_elements 0.72113
published_at 2026-04-07T12:55:00Z
9
value 0.00707
scoring_system epss
scoring_elements 0.7215
published_at 2026-04-08T12:55:00Z
10
value 0.00707
scoring_system epss
scoring_elements 0.72162
published_at 2026-04-09T12:55:00Z
11
value 0.00707
scoring_system epss
scoring_elements 0.72184
published_at 2026-04-11T12:55:00Z
12
value 0.00707
scoring_system epss
scoring_elements 0.72168
published_at 2026-04-12T12:55:00Z
13
value 0.00707
scoring_system epss
scoring_elements 0.72154
published_at 2026-04-13T12:55:00Z
14
value 0.00707
scoring_system epss
scoring_elements 0.72196
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16254
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16254
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16254
8
reference_url https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789556
reference_id 1789556
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789556
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
reference_id 972230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
11
reference_url https://security.archlinux.org/ASA-201910-2
reference_id ASA-201910-2
reference_type
scores
url https://security.archlinux.org/ASA-201910-2
12
reference_url https://security.archlinux.org/AVG-1039
reference_id AVG-1039
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1039
13
reference_url https://security.gentoo.org/glsa/202003-06
reference_id GLSA-202003-06
reference_type
scores
url https://security.gentoo.org/glsa/202003-06
14
reference_url https://access.redhat.com/errata/RHSA-2021:2104
reference_id RHSA-2021:2104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2104
15
reference_url https://access.redhat.com/errata/RHSA-2021:2230
reference_id RHSA-2021:2230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2230
16
reference_url https://access.redhat.com/errata/RHSA-2021:2587
reference_id RHSA-2021:2587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2587
17
reference_url https://access.redhat.com/errata/RHSA-2021:2588
reference_id RHSA-2021:2588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2588
18
reference_url https://access.redhat.com/errata/RHSA-2022:0581
reference_id RHSA-2022:0581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0581
19
reference_url https://access.redhat.com/errata/RHSA-2022:0582
reference_id RHSA-2022:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0582
20
reference_url https://access.redhat.com/errata/RHSA-2026:7305
reference_id RHSA-2026:7305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7305
21
reference_url https://access.redhat.com/errata/RHSA-2026:7307
reference_id RHSA-2026:7307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7307
22
reference_url https://access.redhat.com/errata/RHSA-2026:8838
reference_id RHSA-2026:8838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8838
23
reference_url https://usn.ubuntu.com/4201-1/
reference_id USN-4201-1
reference_type
scores
url https://usn.ubuntu.com/4201-1/
fixed_packages
0
url pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
purl pkg:deb/debian/jruby@9.3.9.0%2Bds-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x9w-2k98-wydm
1
vulnerability VCID-uxdx-abx7-fkdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-8%3Fdistro=trixie
2
url pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.4.8.0%252Bds-3%3Fdistro=trixie
aliases CVE-2019-16254, GHSA-w9fp-2996-hhwx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y56y-5am7-wkhr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/jruby@9.3.9.0%252Bds-1%3Fdistro=trixie