Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-cvs2-zecm-z3h8
Summaryruby: DL:: dlopen could open a library with tainted library name
Aliases
0
alias CVE-2015-7551
1
alias GHSA-m9xr-x5mq-4fp5
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el7
purl pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-91b7-xx8t-rqhr
1
vulnerability VCID-b36p-re17-n7dq
2
vulnerability VCID-beub-d11r-nbe4
3
vulnerability VCID-cde2-rv4n-tkau
4
vulnerability VCID-cvs2-zecm-z3h8
5
vulnerability VCID-dh8q-zyat-43ce
6
vulnerability VCID-fapg-pt6b-rfb2
7
vulnerability VCID-fhyd-6fyt-byhp
8
vulnerability VCID-jmzh-89dm-r7g2
9
vulnerability VCID-xgsa-5umz-qffr
10
vulnerability VCID-xkd6-jvma-skfk
11
vulnerability VCID-xz68-vwz2-2ke4
12
vulnerability VCID-zybm-uuxu-67gh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19%3Farch=el7
1
url pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el6
purl pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-91b7-xx8t-rqhr
1
vulnerability VCID-b36p-re17-n7dq
2
vulnerability VCID-beub-d11r-nbe4
3
vulnerability VCID-cde2-rv4n-tkau
4
vulnerability VCID-cvs2-zecm-z3h8
5
vulnerability VCID-dh8q-zyat-43ce
6
vulnerability VCID-fapg-pt6b-rfb2
7
vulnerability VCID-fhyd-6fyt-byhp
8
vulnerability VCID-jmzh-89dm-r7g2
9
vulnerability VCID-xgsa-5umz-qffr
10
vulnerability VCID-xkd6-jvma-skfk
11
vulnerability VCID-xz68-vwz2-2ke4
12
vulnerability VCID-zybm-uuxu-67gh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-ruby22-ruby@2.2.9-19%3Farch=el6
2
url pkg:ruby/ruby@1.9.2
purl pkg:ruby/ruby@1.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cvs2-zecm-z3h8
1
vulnerability VCID-dh8q-zyat-43ce
2
vulnerability VCID-e58n-x5ra-6ybq
3
vulnerability VCID-rh8q-s45v-xbhg
4
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.2
3
url pkg:ruby/ruby@2.0.1
purl pkg:ruby/ruby@2.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bdw-9rs5-6ycg
1
vulnerability VCID-3uaa-r5vu-2fg9
2
vulnerability VCID-cvs2-zecm-z3h8
3
vulnerability VCID-g7ju-q41v-wyhd
4
vulnerability VCID-k6dd-ykw2-nfh6
5
vulnerability VCID-pkg9-61ah-kbex
6
vulnerability VCID-wzdf-d9fv-u3hh
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.0.1
4
url pkg:ruby/ruby@2.2
purl pkg:ruby/ruby@2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bdw-9rs5-6ycg
1
vulnerability VCID-3uaa-r5vu-2fg9
2
vulnerability VCID-cvs2-zecm-z3h8
3
vulnerability VCID-k6dd-ykw2-nfh6
4
vulnerability VCID-rwak-wvuw-qbcg
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.2
5
url pkg:ruby/ruby@2.3
purl pkg:ruby/ruby@2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cad-uybu-2uau
1
vulnerability VCID-3uaa-r5vu-2fg9
2
vulnerability VCID-91b7-xx8t-rqhr
3
vulnerability VCID-bad1-7aa4-cugv
4
vulnerability VCID-beub-d11r-nbe4
5
vulnerability VCID-cvs2-zecm-z3h8
6
vulnerability VCID-fapg-pt6b-rfb2
7
vulnerability VCID-qyz5-zmnt-qucy
8
vulnerability VCID-rdme-1q3s-43d8
9
vulnerability VCID-rwak-wvuw-qbcg
10
vulnerability VCID-xkd6-jvma-skfk
11
vulnerability VCID-y29u-wpkt-rkgp
12
vulnerability VCID-zwxw-299r-wfgx
13
vulnerability VCID-zybm-uuxu-67gh
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@2.3
References
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
2
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
3
reference_url https://access.redhat.com/errata/RHSA-2018:0583
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0583
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7551.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7551.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7551
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37622
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37555
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37682
published_at 2026-04-12T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37654
published_at 2026-04-13T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37702
published_at 2026-04-16T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37684
published_at 2026-04-18T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37737
published_at 2026-04-02T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37762
published_at 2026-04-04T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.3764
published_at 2026-04-07T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.3769
published_at 2026-04-08T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37704
published_at 2026-04-09T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37717
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7551
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
reference_id
reference_type
scores
url https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7551
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 8.4
scoring_system cvssv3
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7551
9
reference_url https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7551.html
reference_id
reference_type
scores
url https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7551.html
10
reference_url https://puppet.com/security/cve/ruby-dec-2015-security-fixes
reference_id
reference_type
scores
url https://puppet.com/security/cve/ruby-dec-2015-security-fixes
11
reference_url https://support.apple.com/HT206167
reference_id
reference_type
scores
url https://support.apple.com/HT206167
12
reference_url https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
13
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
14
reference_url http://www.securityfocus.com/bid/76060
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76060
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1248935
reference_id 1248935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1248935
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.1.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:2.2.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
30
reference_url https://usn.ubuntu.com/3365-1/
reference_id USN-3365-1
reference_type
scores
url https://usn.ubuntu.com/3365-1/
Weaknesses
0
cwe_id 267
name Privilege Defined With Unsafe Actions
description A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.
1
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.6 - 8.4
Exploitability0.5
Weighted_severity7.6
Risk_score3.8
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-cvs2-zecm-z3h8