Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qjwb-ph9u-bubf
Summaryruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)
Aliases
0
alias CVE-2008-3443
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/ruby@1.6.4-7?arch=el2
purl pkg:rpm/redhat/ruby@1.6.4-7?arch=el2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-qjwb-ph9u-bubf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.6.4-7%3Farch=el2
1
url pkg:rpm/redhat/ruby@1.6.8-13?arch=el3
purl pkg:rpm/redhat/ruby@1.6.8-13?arch=el3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-pegr-f5mh-ekdz
2
vulnerability VCID-qjwb-ph9u-bubf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.6.8-13%3Farch=el3
2
url pkg:rpm/redhat/ruby@1.8.1-7.el4_7?arch=1
purl pkg:rpm/redhat/ruby@1.8.1-7.el4_7?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-a15m-bcma-vfa7
2
vulnerability VCID-fw7k-88kf-1kgg
3
vulnerability VCID-m6vt-b9kt-93hw
4
vulnerability VCID-pegr-f5mh-ekdz
5
vulnerability VCID-qjwb-ph9u-bubf
6
vulnerability VCID-r8r3-3x8p-ebh5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.1-7.el4_7%3Farch=1
3
url pkg:rpm/redhat/ruby@1.8.5-5.el5_2?arch=5
purl pkg:rpm/redhat/ruby@1.8.5-5.el5_2?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-a15m-bcma-vfa7
2
vulnerability VCID-fw7k-88kf-1kgg
3
vulnerability VCID-m6vt-b9kt-93hw
4
vulnerability VCID-pegr-f5mh-ekdz
5
vulnerability VCID-qjwb-ph9u-bubf
6
vulnerability VCID-r8r3-3x8p-ebh5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.5-5.el5_2%3Farch=5
4
url pkg:ruby/ruby@1.8.7
purl pkg:ruby/ruby@1.8.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-5bte-uex2-f7du
2
vulnerability VCID-8fbf-8fea-27d9
3
vulnerability VCID-94vg-kqhg-qfdv
4
vulnerability VCID-9gp6-pvw1-ufhs
5
vulnerability VCID-9ukz-9357-aqb6
6
vulnerability VCID-a15m-bcma-vfa7
7
vulnerability VCID-bv9s-j5yk-m3aw
8
vulnerability VCID-c9sy-czbr-tfer
9
vulnerability VCID-ea13-mua4-1fb9
10
vulnerability VCID-fw7k-88kf-1kgg
11
vulnerability VCID-jx79-wpg7-2yaa
12
vulnerability VCID-mzqm-gc4w-fbfp
13
vulnerability VCID-nsa4-b31c-37g2
14
vulnerability VCID-pegr-f5mh-ekdz
15
vulnerability VCID-qjwb-ph9u-bubf
16
vulnerability VCID-xtny-ychb-fff1
17
vulnerability VCID-ynyp-ybd9-57df
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.8.7
5
url pkg:ruby/ruby@1.8.8
purl pkg:ruby/ruby@1.8.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ww6-w1k6-xqbp
1
vulnerability VCID-4yvc-uzev-wua4
2
vulnerability VCID-5bte-uex2-f7du
3
vulnerability VCID-8fbf-8fea-27d9
4
vulnerability VCID-9gp6-pvw1-ufhs
5
vulnerability VCID-9ukz-9357-aqb6
6
vulnerability VCID-a15m-bcma-vfa7
7
vulnerability VCID-ar57-vndq-yka6
8
vulnerability VCID-bjts-v9q2-9yg8
9
vulnerability VCID-bv9s-j5yk-m3aw
10
vulnerability VCID-c9sy-czbr-tfer
11
vulnerability VCID-ea13-mua4-1fb9
12
vulnerability VCID-fw7k-88kf-1kgg
13
vulnerability VCID-jx79-wpg7-2yaa
14
vulnerability VCID-mzqm-gc4w-fbfp
15
vulnerability VCID-nsa4-b31c-37g2
16
vulnerability VCID-nxub-6qsu-hbhk
17
vulnerability VCID-pegr-f5mh-ekdz
18
vulnerability VCID-qjwb-ph9u-bubf
19
vulnerability VCID-r8r3-3x8p-ebh5
20
vulnerability VCID-rh8q-s45v-xbhg
21
vulnerability VCID-weh8-bs3g-a3hp
22
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.8.8
References
0
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3443.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3443.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3443
reference_id
reference_type
scores
0
value 0.29255
scoring_system epss
scoring_elements 0.966
published_at 2026-04-16T12:55:00Z
1
value 0.29255
scoring_system epss
scoring_elements 0.9656
published_at 2026-04-01T12:55:00Z
2
value 0.29255
scoring_system epss
scoring_elements 0.9657
published_at 2026-04-02T12:55:00Z
3
value 0.29255
scoring_system epss
scoring_elements 0.96575
published_at 2026-04-04T12:55:00Z
4
value 0.29255
scoring_system epss
scoring_elements 0.96578
published_at 2026-04-07T12:55:00Z
5
value 0.29255
scoring_system epss
scoring_elements 0.96586
published_at 2026-04-08T12:55:00Z
6
value 0.29255
scoring_system epss
scoring_elements 0.96588
published_at 2026-04-09T12:55:00Z
7
value 0.29255
scoring_system epss
scoring_elements 0.9659
published_at 2026-04-11T12:55:00Z
8
value 0.29255
scoring_system epss
scoring_elements 0.96591
published_at 2026-04-12T12:55:00Z
9
value 0.29255
scoring_system epss
scoring_elements 0.96593
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3443
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443
4
reference_url http://secunia.com/advisories/31430
reference_id
reference_type
scores
url http://secunia.com/advisories/31430
5
reference_url http://secunia.com/advisories/32165
reference_id
reference_type
scores
url http://secunia.com/advisories/32165
6
reference_url http://secunia.com/advisories/32219
reference_id
reference_type
scores
url http://secunia.com/advisories/32219
7
reference_url http://secunia.com/advisories/32371
reference_id
reference_type
scores
url http://secunia.com/advisories/32371
8
reference_url http://secunia.com/advisories/32372
reference_id
reference_type
scores
url http://secunia.com/advisories/32372
9
reference_url http://secunia.com/advisories/33185
reference_id
reference_type
scores
url http://secunia.com/advisories/33185
10
reference_url http://secunia.com/advisories/33398
reference_id
reference_type
scores
url http://secunia.com/advisories/33398
11
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
12
reference_url http://securityreason.com/securityalert/4158
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4158
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44688
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44688
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9570
15
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
16
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
17
reference_url https://www.exploit-db.com/exploits/6239
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6239
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
19
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
20
reference_url http://www.debian.org/security/2009/dsa-1695
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1695
21
reference_url http://www.redhat.com/support/errata/RHSA-2008-0895.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0895.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2008-0897.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0897.html
23
reference_url http://www.securityfocus.com/bid/30682
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30682
24
reference_url http://www.securitytracker.com/id?1021075
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021075
25
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
26
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=459266
reference_id 459266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=459266
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p114:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p231:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p52:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3443
reference_id CVE-2008-3443
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3443
80
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/6239.txt
reference_id OSVDB-47800;CVE-2008-3443
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/6239.txt
81
reference_url https://access.redhat.com/errata/RHSA-2008:0895
reference_id RHSA-2008:0895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0895
82
reference_url https://access.redhat.com/errata/RHSA-2008:0896
reference_id RHSA-2008:0896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0896
83
reference_url https://access.redhat.com/errata/RHSA-2008:0897
reference_id RHSA-2008:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0897
84
reference_url https://usn.ubuntu.com/651-1/
reference_id USN-651-1
reference_type
scores
url https://usn.ubuntu.com/651-1/
85
reference_url https://usn.ubuntu.com/691-1/
reference_id USN-691-1
reference_type
scores
url https://usn.ubuntu.com/691-1/
Weaknesses
0
cwe_id 399
name Resource Management Errors
description Weaknesses in this category are related to improper management of system resources.
Exploits
0
date_added 2008-08-12
description Ruby 1.9 - regex engine Remote Socket Memory Leak
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2008-08-13
exploit_type dos
platform multiple
source_date_updated 2016-12-21
data_source Exploit-DB
source_url
Severity_range_score5.0 - 5.0
Exploitability2.0
Weighted_severity4.5
Risk_score9.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qjwb-ph9u-bubf