Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-sf98-mryd-yfb3
Summarysecurity update
Aliases
0
alias CVE-2015-9096
1
alias GHSA-2h3c-5vqm-gqfh
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1?arch=hum1
purl pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qm3-nbsk-73he
1
vulnerability VCID-4yvc-uzev-wua4
2
vulnerability VCID-5xez-skrj-b3h4
3
vulnerability VCID-91b7-xx8t-rqhr
4
vulnerability VCID-a15m-bcma-vfa7
5
vulnerability VCID-arjz-geyr-q7e3
6
vulnerability VCID-ea13-mua4-1fb9
7
vulnerability VCID-fw7k-88kf-1kgg
8
vulnerability VCID-g7ju-q41v-wyhd
9
vulnerability VCID-jj3a-fpsa-a7at
10
vulnerability VCID-pegr-f5mh-ekdz
11
vulnerability VCID-qyz5-zmnt-qucy
12
vulnerability VCID-rwak-wvuw-qbcg
13
vulnerability VCID-sf98-mryd-yfb3
14
vulnerability VCID-sfzh-hn56-hbak
15
vulnerability VCID-t9y5-hd9b-bkc4
16
vulnerability VCID-wzdf-d9fv-u3hh
17
vulnerability VCID-x126-x9qm-e7d3
18
vulnerability VCID-xkd6-jvma-skfk
19
vulnerability VCID-y56y-5am7-wkhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1%3Farch=hum1
1
url pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1?arch=hum1
purl pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qm3-nbsk-73he
1
vulnerability VCID-4yvc-uzev-wua4
2
vulnerability VCID-5xez-skrj-b3h4
3
vulnerability VCID-91b7-xx8t-rqhr
4
vulnerability VCID-a15m-bcma-vfa7
5
vulnerability VCID-arjz-geyr-q7e3
6
vulnerability VCID-ea13-mua4-1fb9
7
vulnerability VCID-fw7k-88kf-1kgg
8
vulnerability VCID-g7ju-q41v-wyhd
9
vulnerability VCID-jj3a-fpsa-a7at
10
vulnerability VCID-pegr-f5mh-ekdz
11
vulnerability VCID-qyz5-zmnt-qucy
12
vulnerability VCID-rwak-wvuw-qbcg
13
vulnerability VCID-sf98-mryd-yfb3
14
vulnerability VCID-sfzh-hn56-hbak
15
vulnerability VCID-t9y5-hd9b-bkc4
16
vulnerability VCID-wzdf-d9fv-u3hh
17
vulnerability VCID-x126-x9qm-e7d3
18
vulnerability VCID-xkd6-jvma-skfk
19
vulnerability VCID-y56y-5am7-wkhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1%3Farch=hum1
2
url pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3?arch=hum1
purl pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qm3-nbsk-73he
1
vulnerability VCID-4yvc-uzev-wua4
2
vulnerability VCID-5xez-skrj-b3h4
3
vulnerability VCID-91b7-xx8t-rqhr
4
vulnerability VCID-a15m-bcma-vfa7
5
vulnerability VCID-arjz-geyr-q7e3
6
vulnerability VCID-ea13-mua4-1fb9
7
vulnerability VCID-fw7k-88kf-1kgg
8
vulnerability VCID-g7ju-q41v-wyhd
9
vulnerability VCID-jj3a-fpsa-a7at
10
vulnerability VCID-pegr-f5mh-ekdz
11
vulnerability VCID-qyz5-zmnt-qucy
12
vulnerability VCID-rwak-wvuw-qbcg
13
vulnerability VCID-sf98-mryd-yfb3
14
vulnerability VCID-sfzh-hn56-hbak
15
vulnerability VCID-t9y5-hd9b-bkc4
16
vulnerability VCID-wzdf-d9fv-u3hh
17
vulnerability VCID-x126-x9qm-e7d3
18
vulnerability VCID-xkd6-jvma-skfk
19
vulnerability VCID-y56y-5am7-wkhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3%3Farch=hum1
3
url pkg:ruby/ruby@2.4
purl pkg:ruby/ruby@2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cad-uybu-2uau
1
vulnerability VCID-91b7-xx8t-rqhr
2
vulnerability VCID-bad1-7aa4-cugv
3
vulnerability VCID-beub-d11r-nbe4
4
vulnerability VCID-c3y8-w4b4-3qea
5
vulnerability VCID-fapg-pt6b-rfb2
6
vulnerability VCID-kamp-zmtx-aqbz
7
vulnerability VCID-qyz5-zmnt-qucy
8
vulnerability VCID-rdme-1q3s-43d8
9
vulnerability VCID-sf98-mryd-yfb3
10
vulnerability VCID-tzne-zeeh-wuet
11
vulnerability VCID-xkd6-jvma-skfk
12
vulnerability VCID-y29u-wpkt-rkgp
13
vulnerability VCID-zwxw-299r-wfgx
14
vulnerability VCID-zybm-uuxu-67gh
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.4
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9096.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9096
reference_id
reference_type
scores
0
value 0.01592
scoring_system epss
scoring_elements 0.81593
published_at 2026-04-01T12:55:00Z
1
value 0.01592
scoring_system epss
scoring_elements 0.81698
published_at 2026-04-21T12:55:00Z
2
value 0.01592
scoring_system epss
scoring_elements 0.81662
published_at 2026-04-12T12:55:00Z
3
value 0.01592
scoring_system epss
scoring_elements 0.81656
published_at 2026-04-13T12:55:00Z
4
value 0.01592
scoring_system epss
scoring_elements 0.81694
published_at 2026-04-18T12:55:00Z
5
value 0.01592
scoring_system epss
scoring_elements 0.81604
published_at 2026-04-02T12:55:00Z
6
value 0.01592
scoring_system epss
scoring_elements 0.81625
published_at 2026-04-04T12:55:00Z
7
value 0.01592
scoring_system epss
scoring_elements 0.81623
published_at 2026-04-07T12:55:00Z
8
value 0.01592
scoring_system epss
scoring_elements 0.8165
published_at 2026-04-08T12:55:00Z
9
value 0.01592
scoring_system epss
scoring_elements 0.81655
published_at 2026-04-09T12:55:00Z
10
value 0.01592
scoring_system epss
scoring_elements 0.81676
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://hackerone.com/reports/137631
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://hackerone.com/reports/137631
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461846
reference_id 1461846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461846
12
reference_url https://access.redhat.com/errata/RHSA-2026:7305
reference_id RHSA-2026:7305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7305
13
reference_url https://access.redhat.com/errata/RHSA-2026:7307
reference_id RHSA-2026:7307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7307
14
reference_url https://access.redhat.com/errata/RHSA-2026:8838
reference_id RHSA-2026:8838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8838
15
reference_url https://usn.ubuntu.com/3365-1/
reference_id USN-3365-1
reference_type
scores
url https://usn.ubuntu.com/3365-1/
Weaknesses
0
cwe_id 88
name Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
description The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Exploits
Severity_range_score4.3 - 6.1
Exploitability0.5
Weighted_severity4.9
Risk_score2.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-sf98-mryd-yfb3