Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-nfpt-w93k-dqa5
Summary
rest-client Gem Contains Malicious Code
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x.
Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory.
These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon.
Aliases
0
alias CVE-2019-15224
1
alias GHSA-333g-rpr4-7hxq
Fixed_packages
0
url pkg:deb/debian/ruby-rest-client@0?distro=trixie
purl pkg:deb/debian/ruby-rest-client@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rest-client@0%3Fdistro=trixie
1
url pkg:deb/debian/ruby-rest-client@2.1.0-1?distro=trixie
purl pkg:deb/debian/ruby-rest-client@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rest-client@2.1.0-1%3Fdistro=trixie
2
url pkg:deb/debian/ruby-rest-client@2.1.0-3?distro=trixie
purl pkg:deb/debian/ruby-rest-client@2.1.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rest-client@2.1.0-3%3Fdistro=trixie
3
url pkg:deb/debian/ruby-rest-client@2.1.0-4?distro=trixie
purl pkg:deb/debian/ruby-rest-client@2.1.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rest-client@2.1.0-4%3Fdistro=trixie
4
url pkg:gem/rest-client@1.6.14
purl pkg:gem/rest-client@1.6.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rest-client@1.6.14
5
url pkg:gem/rest-client@1.7.0
purl pkg:gem/rest-client@1.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jggb-58ap-ybab
1
vulnerability VCID-vhdm-w6p1-uuh9
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rest-client@1.7.0
Affected_packages
0
url pkg:gem/awesome-bot@0
purl pkg:gem/awesome-bot@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/awesome-bot@0
1
url pkg:gem/awesome-bot@1.18.0
purl pkg:gem/awesome-bot@1.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/awesome-bot@1.18.0
2
url pkg:gem/bitcoin_vanity@0
purl pkg:gem/bitcoin_vanity@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/bitcoin_vanity@0
3
url pkg:gem/bitcoin_vanity@4.3.3
purl pkg:gem/bitcoin_vanity@4.3.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/bitcoin_vanity@4.3.3
4
url pkg:gem/blockchain_wallet@0
purl pkg:gem/blockchain_wallet@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/blockchain_wallet@0
5
url pkg:gem/blockchain_wallet@0.0.6
purl pkg:gem/blockchain_wallet@0.0.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/blockchain_wallet@0.0.6
6
url pkg:gem/blockchain_wallet@0.0.7
purl pkg:gem/blockchain_wallet@0.0.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/blockchain_wallet@0.0.7
7
url pkg:gem/capistrano-colors@0
purl pkg:gem/capistrano-colors@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/capistrano-colors@0
8
url pkg:gem/capistrano-colors@0.5.5
purl pkg:gem/capistrano-colors@0.5.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/capistrano-colors@0.5.5
9
url pkg:gem/coin_base@0
purl pkg:gem/coin_base@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/coin_base@0
10
url pkg:gem/coin_base@4.2.1
purl pkg:gem/coin_base@4.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/coin_base@4.2.1
11
url pkg:gem/coin_base@4.2.2
purl pkg:gem/coin_base@4.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/coin_base@4.2.2
12
url pkg:gem/coming-soon@0
purl pkg:gem/coming-soon@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/coming-soon@0
13
url pkg:gem/coming-soon@0.2.8
purl pkg:gem/coming-soon@0.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/coming-soon@0.2.8
14
url pkg:gem/cron_parser@0.1.4
purl pkg:gem/cron_parser@0.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/cron_parser@0.1.4
15
url pkg:gem/cron_parser@1.0.12
purl pkg:gem/cron_parser@1.0.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/cron_parser@1.0.12
16
url pkg:gem/cron_parser@1.0.13
purl pkg:gem/cron_parser@1.0.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/cron_parser@1.0.13
17
url pkg:gem/cron_parser@1.0.14
purl pkg:gem/cron_parser@1.0.14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/cron_parser@1.0.14
18
url pkg:gem/doge-coin@0
purl pkg:gem/doge-coin@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/doge-coin@0
19
url pkg:gem/doge-coin@1.0.2
purl pkg:gem/doge-coin@1.0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/doge-coin@1.0.2
20
url pkg:gem/lita_coin@0.0.3
purl pkg:gem/lita_coin@0.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/lita_coin@0.0.3
21
url pkg:gem/omniauth_amazon@0
purl pkg:gem/omniauth_amazon@0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/omniauth_amazon@0
22
url pkg:gem/omniauth_amazon@1.0.1
purl pkg:gem/omniauth_amazon@1.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/omniauth_amazon@1.0.1
23
url pkg:gem/rest-client@1.6.10
purl pkg:gem/rest-client@1.6.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rest-client@1.6.10
24
url pkg:gem/rest-client@1.6.13
purl pkg:gem/rest-client@1.6.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nfpt-w93k-dqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rest-client@1.6.13
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15224.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15224
reference_id
reference_type
scores
0
value 0.02163
scoring_system epss
scoring_elements 0.84317
published_at 2026-04-21T12:55:00Z
1
value 0.02163
scoring_system epss
scoring_elements 0.84223
published_at 2026-04-01T12:55:00Z
2
value 0.02163
scoring_system epss
scoring_elements 0.84235
published_at 2026-04-02T12:55:00Z
3
value 0.02163
scoring_system epss
scoring_elements 0.84254
published_at 2026-04-04T12:55:00Z
4
value 0.02163
scoring_system epss
scoring_elements 0.84255
published_at 2026-04-07T12:55:00Z
5
value 0.02163
scoring_system epss
scoring_elements 0.84277
published_at 2026-04-08T12:55:00Z
6
value 0.02163
scoring_system epss
scoring_elements 0.84283
published_at 2026-04-09T12:55:00Z
7
value 0.02163
scoring_system epss
scoring_elements 0.843
published_at 2026-04-11T12:55:00Z
8
value 0.02163
scoring_system epss
scoring_elements 0.84295
published_at 2026-04-12T12:55:00Z
9
value 0.02163
scoring_system epss
scoring_elements 0.84291
published_at 2026-04-13T12:55:00Z
10
value 0.02163
scoring_system epss
scoring_elements 0.84313
published_at 2026-04-16T12:55:00Z
11
value 0.02163
scoring_system epss
scoring_elements 0.84315
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15224
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/rest-client/rest-client/issues/713
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rest-client/rest-client/issues/713
4
reference_url https://github.com/rubygems.org/issues/2097
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
url https://github.com/rubygems.org/issues/2097
5
reference_url https://github.com/rubygems/rubygems.org/issues/2097
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems.org/issues/2097
6
reference_url https://github.com/rubygems/rubygems.org/wiki/Gems-yanked-and-accounts-locked#19-aug-2019
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubygems/rubygems.org/wiki/Gems-yanked-and-accounts-locked#19-aug-2019
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blockchain_wallet/CVE-2019-15224.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blockchain_wallet/CVE-2019-15224.yml
8
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/coin_base/CVE-2019-15224.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/coin_base/CVE-2019-15224.yml
9
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doge-coin/CVE-2019-15224.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doge-coin/CVE-2019-15224.yml
10
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lita_coin/CVE-2019-15224.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lita_coin/CVE-2019-15224.yml
11
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth_amazon/CVE-2019-15224.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth_amazon/CVE-2019-15224.yml
12
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rest-client/CVE-2019-15224.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rest-client/CVE-2019-15224.yml
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15224
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-15224
14
reference_url https://rubygems.org/gems/rest-client/versions/
reference_id
reference_type
scores
url https://rubygems.org/gems/rest-client/versions/
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743940
reference_id 1743940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743940
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*
17
reference_url https://github.com/advisories/GHSA-333g-rpr4-7hxq
reference_id GHSA-333g-rpr4-7hxq
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-333g-rpr4-7hxq
Weaknesses
0
cwe_id 94
name Improper Control of Generation of Code ('Code Injection')
description The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
1
cwe_id 348
name Use of Less Trusted Source
description The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
4
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Exploits
Severity_range_score7.2 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-nfpt-w93k-dqa5