Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ym1e-mqp8-vbfr
Summary
Cryptographic Issues
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
Aliases
0
alias CVE-2016-7798
1
alias GHSA-6h88-qjpv-p32m
Fixed_packages
0
url pkg:deb/debian/ruby-attr-encrypted@3.0.1-2?distro=trixie
purl pkg:deb/debian/ruby-attr-encrypted@3.0.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-attr-encrypted@3.0.1-2%3Fdistro=trixie
1
url pkg:deb/debian/ruby-attr-encrypted@3.1.0-3?distro=trixie
purl pkg:deb/debian/ruby-attr-encrypted@3.1.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-attr-encrypted@3.1.0-3%3Fdistro=trixie
2
url pkg:deb/debian/ruby-attr-encrypted@3.1.0-4?distro=trixie
purl pkg:deb/debian/ruby-attr-encrypted@3.1.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-attr-encrypted@3.1.0-4%3Fdistro=trixie
3
url pkg:deb/debian/ruby-attr-encrypted@4.1.0-1?distro=trixie
purl pkg:deb/debian/ruby-attr-encrypted@4.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-attr-encrypted@4.1.0-1%3Fdistro=trixie
4
url pkg:deb/debian/ruby-encryptor@3.0.0-1?distro=trixie
purl pkg:deb/debian/ruby-encryptor@3.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-encryptor@3.0.0-1%3Fdistro=trixie
5
url pkg:deb/debian/ruby-encryptor@3.0.0-2?distro=trixie
purl pkg:deb/debian/ruby-encryptor@3.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-encryptor@3.0.0-2%3Fdistro=trixie
6
url pkg:gem/openssl@2.0.0
purl pkg:gem/openssl@2.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c3y8-w4b4-3qea
1
vulnerability VCID-fapg-pt6b-rfb2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/openssl@2.0.0
Affected_packages
0
url pkg:gem/openssl@2.0.0.beta.1
purl pkg:gem/openssl@2.0.0.beta.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c3y8-w4b4-3qea
1
vulnerability VCID-fapg-pt6b-rfb2
2
vulnerability VCID-ym1e-mqp8-vbfr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/openssl@2.0.0.beta.1
1
url pkg:gem/openssl@2.0.0.beta.2
purl pkg:gem/openssl@2.0.0.beta.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c3y8-w4b4-3qea
1
vulnerability VCID-fapg-pt6b-rfb2
2
vulnerability VCID-ym1e-mqp8-vbfr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/openssl@2.0.0.beta.2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7798.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7798
reference_id
reference_type
scores
0
value 0.00557
scoring_system epss
scoring_elements 0.68243
published_at 2026-04-24T12:55:00Z
1
value 0.00792
scoring_system epss
scoring_elements 0.73912
published_at 2026-04-09T12:55:00Z
2
value 0.00792
scoring_system epss
scoring_elements 0.73857
published_at 2026-04-01T12:55:00Z
3
value 0.00792
scoring_system epss
scoring_elements 0.73915
published_at 2026-04-12T12:55:00Z
4
value 0.00792
scoring_system epss
scoring_elements 0.73933
published_at 2026-04-11T12:55:00Z
5
value 0.00792
scoring_system epss
scoring_elements 0.73898
published_at 2026-04-08T12:55:00Z
6
value 0.00792
scoring_system epss
scoring_elements 0.73867
published_at 2026-04-02T12:55:00Z
7
value 0.00792
scoring_system epss
scoring_elements 0.73892
published_at 2026-04-04T12:55:00Z
8
value 0.00792
scoring_system epss
scoring_elements 0.73864
published_at 2026-04-07T12:55:00Z
9
value 0.00792
scoring_system epss
scoring_elements 0.73949
published_at 2026-04-21T12:55:00Z
10
value 0.00792
scoring_system epss
scoring_elements 0.73957
published_at 2026-04-18T12:55:00Z
11
value 0.00792
scoring_system epss
scoring_elements 0.73948
published_at 2026-04-16T12:55:00Z
12
value 0.00792
scoring_system epss
scoring_elements 0.73907
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/advisories/GHSA-6h88-qjpv-p32m
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-6h88-qjpv-p32m
11
reference_url https://github.com/ruby/openssl
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/openssl
12
reference_url https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062
13
reference_url https://github.com/ruby/openssl/issues/49
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/ruby/openssl/issues/49
14
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openssl/CVE-2016-7798.yml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openssl/CVE-2016-7798.yml
15
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
16
reference_url https://web.archive.org/web/20210121065227/https://www.securityfocus.com/bid/93031/info
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210121065227/https://www.securityfocus.com/bid/93031/info
17
reference_url https://www.debian.org/security/2017/dsa-3966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2017/dsa-3966
18
reference_url http://www.openwall.com/lists/oss-security/2016/09/19/9
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/09/19/9
19
reference_url http://www.openwall.com/lists/oss-security/2016/09/30/6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/09/30/6
20
reference_url http://www.openwall.com/lists/oss-security/2016/10/01/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/10/01/2
21
reference_url http://www.securityfocus.com/bid/93031
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/93031
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1381526
reference_id 1381526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1381526
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-7798
reference_id CVE-2016-7798
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-7798
24
reference_url https://usn.ubuntu.com/3365-1/
reference_id USN-3365-1
reference_type
scores
url https://usn.ubuntu.com/3365-1/
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 326
name Inadequate Encryption Strength
description The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score3.7 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ym1e-mqp8-vbfr