Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-rh8q-s45v-xbhg
Summary
Multiple vulnerabilities have been found in Ruby, allowing
    context-dependent attackers to cause a Denial of Service condition.
Aliases
0
alias CVE-2011-1004
1
alias GHSA-45wv-gc6w-fq7m
2
alias OSV-70958
Fixed_packages
0
url pkg:ebuild/dev-lang/ruby@2.0.0_p598
purl pkg:ebuild/dev-lang/ruby@2.0.0_p598
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/ruby@2.0.0_p598
Affected_packages
0
url pkg:rpm/redhat/ruby@1.8.5-19.el5_6?arch=1
purl pkg:rpm/redhat/ruby@1.8.5-19.el5_6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9ukz-9357-aqb6
1
vulnerability VCID-bv9s-j5yk-m3aw
2
vulnerability VCID-nxub-6qsu-hbhk
3
vulnerability VCID-rh8q-s45v-xbhg
4
vulnerability VCID-t1p6-1u4n-gybf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.5-19.el5_6%3Farch=1
1
url pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1?arch=1
purl pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nxub-6qsu-hbhk
1
vulnerability VCID-rh8q-s45v-xbhg
2
vulnerability VCID-t1p6-1u4n-gybf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1%3Farch=1
2
url pkg:ruby/ruby@1.8.8
purl pkg:ruby/ruby@1.8.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ww6-w1k6-xqbp
1
vulnerability VCID-4yvc-uzev-wua4
2
vulnerability VCID-5bte-uex2-f7du
3
vulnerability VCID-8fbf-8fea-27d9
4
vulnerability VCID-9gp6-pvw1-ufhs
5
vulnerability VCID-9ukz-9357-aqb6
6
vulnerability VCID-a15m-bcma-vfa7
7
vulnerability VCID-ar57-vndq-yka6
8
vulnerability VCID-bjts-v9q2-9yg8
9
vulnerability VCID-bv9s-j5yk-m3aw
10
vulnerability VCID-c9sy-czbr-tfer
11
vulnerability VCID-ea13-mua4-1fb9
12
vulnerability VCID-fw7k-88kf-1kgg
13
vulnerability VCID-jx79-wpg7-2yaa
14
vulnerability VCID-mzqm-gc4w-fbfp
15
vulnerability VCID-nsa4-b31c-37g2
16
vulnerability VCID-nxub-6qsu-hbhk
17
vulnerability VCID-pegr-f5mh-ekdz
18
vulnerability VCID-qjwb-ph9u-bubf
19
vulnerability VCID-r8r3-3x8p-ebh5
20
vulnerability VCID-rh8q-s45v-xbhg
21
vulnerability VCID-weh8-bs3g-a3hp
22
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.8.8
3
url pkg:ruby/ruby@1.9.2
purl pkg:ruby/ruby@1.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cvs2-zecm-z3h8
1
vulnerability VCID-dh8q-zyat-43ce
2
vulnerability VCID-e58n-x5ra-6ybq
3
vulnerability VCID-rh8q-s45v-xbhg
4
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.2
References
0
reference_url http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054422.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054436.html
3
reference_url http://osvdb.org/70958
reference_id
reference_type
scores
url http://osvdb.org/70958
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1004.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1004.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1004
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13456
published_at 2026-04-21T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13495
published_at 2026-04-01T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13595
published_at 2026-04-02T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-04T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13455
published_at 2026-04-07T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13536
published_at 2026-04-08T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13586
published_at 2026-04-09T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13558
published_at 2026-04-11T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.1352
published_at 2026-04-12T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13474
published_at 2026-04-13T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13385
published_at 2026-04-16T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13383
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1004
6
reference_url http://secunia.com/advisories/43434
reference_id
reference_type
scores
url http://secunia.com/advisories/43434
7
reference_url http://secunia.com/advisories/43573
reference_id
reference_type
scores
url http://secunia.com/advisories/43573
8
reference_url http://support.apple.com/kb/HT5281
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5281
9
reference_url https://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:097
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:097
11
reference_url http://www.openwall.com/lists/oss-security/2011/02/21/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/02/21/2
12
reference_url http://www.openwall.com/lists/oss-security/2011/02/21/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2011/02/21/5
13
reference_url http://www.redhat.com/support/errata/RHSA-2011-0909.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0909.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0910.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0910.html
15
reference_url http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/
16
reference_url http://www.securityfocus.com/bid/46460
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46460
17
reference_url http://www.vupen.com/english/advisories/2011/0539
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0539
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=678913
reference_id 678913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=678913
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:dev:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:dev:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:dev:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1004
reference_id CVE-2011-1004
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1004
26
reference_url https://security.gentoo.org/glsa/201412-27
reference_id GLSA-201412-27
reference_type
scores
url https://security.gentoo.org/glsa/201412-27
27
reference_url https://access.redhat.com/errata/RHSA-2011:0909
reference_id RHSA-2011:0909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0909
28
reference_url https://access.redhat.com/errata/RHSA-2011:0910
reference_id RHSA-2011:0910
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0910
29
reference_url https://usn.ubuntu.com/1377-1/
reference_id USN-1377-1
reference_type
scores
url https://usn.ubuntu.com/1377-1/
Weaknesses
0
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Exploits
Severity_range_score6.3 - 6.3
Exploitability0.5
Weighted_severity5.7
Risk_score2.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-rh8q-s45v-xbhg