Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-dh8q-zyat-43ce
Summaryruby: DL:: dlopen could open a library with tainted library name
Aliases
0
alias CVE-2009-5147
1
alias GHSA-mmq8-m72q-qgm4
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el7
purl pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-91b7-xx8t-rqhr
1
vulnerability VCID-b36p-re17-n7dq
2
vulnerability VCID-beub-d11r-nbe4
3
vulnerability VCID-cde2-rv4n-tkau
4
vulnerability VCID-cvs2-zecm-z3h8
5
vulnerability VCID-dh8q-zyat-43ce
6
vulnerability VCID-fapg-pt6b-rfb2
7
vulnerability VCID-fhyd-6fyt-byhp
8
vulnerability VCID-jmzh-89dm-r7g2
9
vulnerability VCID-xgsa-5umz-qffr
10
vulnerability VCID-xkd6-jvma-skfk
11
vulnerability VCID-xz68-vwz2-2ke4
12
vulnerability VCID-zybm-uuxu-67gh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19%3Farch=el7
1
url pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el6
purl pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-91b7-xx8t-rqhr
1
vulnerability VCID-b36p-re17-n7dq
2
vulnerability VCID-beub-d11r-nbe4
3
vulnerability VCID-cde2-rv4n-tkau
4
vulnerability VCID-cvs2-zecm-z3h8
5
vulnerability VCID-dh8q-zyat-43ce
6
vulnerability VCID-fapg-pt6b-rfb2
7
vulnerability VCID-fhyd-6fyt-byhp
8
vulnerability VCID-jmzh-89dm-r7g2
9
vulnerability VCID-xgsa-5umz-qffr
10
vulnerability VCID-xkd6-jvma-skfk
11
vulnerability VCID-xz68-vwz2-2ke4
12
vulnerability VCID-zybm-uuxu-67gh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19%3Farch=el6
2
url pkg:ruby/ruby@1.9.1
purl pkg:ruby/ruby@1.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dh8q-zyat-43ce
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.1
3
url pkg:ruby/ruby@1.9.2
purl pkg:ruby/ruby@1.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cvs2-zecm-z3h8
1
vulnerability VCID-dh8q-zyat-43ce
2
vulnerability VCID-e58n-x5ra-6ybq
3
vulnerability VCID-rh8q-s45v-xbhg
4
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.2
References
0
reference_url https://access.redhat.com/errata/RHSA-2018:0583
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0583
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5147.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5147.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5147
reference_id
reference_type
scores
0
value 0.56223
scoring_system epss
scoring_elements 0.98113
published_at 2026-04-21T12:55:00Z
1
value 0.56223
scoring_system epss
scoring_elements 0.98091
published_at 2026-04-01T12:55:00Z
2
value 0.56223
scoring_system epss
scoring_elements 0.98108
published_at 2026-04-11T12:55:00Z
3
value 0.56223
scoring_system epss
scoring_elements 0.98109
published_at 2026-04-12T12:55:00Z
4
value 0.56223
scoring_system epss
scoring_elements 0.9811
published_at 2026-04-13T12:55:00Z
5
value 0.56223
scoring_system epss
scoring_elements 0.98115
published_at 2026-04-16T12:55:00Z
6
value 0.56223
scoring_system epss
scoring_elements 0.98117
published_at 2026-04-18T12:55:00Z
7
value 0.56223
scoring_system epss
scoring_elements 0.98095
published_at 2026-04-02T12:55:00Z
8
value 0.56223
scoring_system epss
scoring_elements 0.98098
published_at 2026-04-04T12:55:00Z
9
value 0.56223
scoring_system epss
scoring_elements 0.98099
published_at 2026-04-07T12:55:00Z
10
value 0.56223
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5147
3
reference_url http://seclists.org/oss-sec/2015/q3/222
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2015/q3/222
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
reference_id
reference_type
scores
url https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-5147
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
2
value 7.3
scoring_system cvssv3
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2009-5147
7
reference_url https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
8
reference_url http://www.securityfocus.com/bid/76060
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76060
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1248935
reference_id 1248935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1248935
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p353:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p353:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p353:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p481:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p576:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p594:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p598:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p598:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p598:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p643:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p643:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p643:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p645:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p645:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p645:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p647:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.0.0:p647:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.0.0:p647:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
33
reference_url https://usn.ubuntu.com/3365-1/
reference_id USN-3365-1
reference_type
scores
url https://usn.ubuntu.com/3365-1/
Weaknesses
0
cwe_id 267
name Privilege Defined With Unsafe Actions
description A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.
1
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score2.6 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-dh8q-zyat-43ce