Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e58n-x5ra-6ybq
Summary
Ruby on Windows ARGF.inplace_mode Variable Local Overflow
Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might
allow local users to gain privileges via a crafted ARGF.inplace_mode
value that is not properly handled when constructing the filenames
of the backup files.
Aliases
0
alias CVE-2010-2489
1
alias GHSA-pj28-mx3m-9668
2
alias OSV-66040
Fixed_packages
Affected_packages
0
url pkg:ruby/ruby@1.9
purl pkg:ruby/ruby@1.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5e5v-pmb2-zkba
1
vulnerability VCID-e58n-x5ra-6ybq
2
vulnerability VCID-ggcn-qfts-rbeu
3
vulnerability VCID-m6vt-b9kt-93hw
4
vulnerability VCID-mtmk-9yt6-s3gv
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9
1
url pkg:ruby/ruby@1.9.2
purl pkg:ruby/ruby@1.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cvs2-zecm-z3h8
1
vulnerability VCID-dh8q-zyat-43ce
2
vulnerability VCID-e58n-x5ra-6ybq
3
vulnerability VCID-rh8q-s45v-xbhg
4
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.9.2
References
0
reference_url http://osdir.com/ml/ruby-talk/2010-07/msg00095.html
reference_id
reference_type
scores
url http://osdir.com/ml/ruby-talk/2010-07/msg00095.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2489
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32467
published_at 2026-04-21T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32473
published_at 2026-04-01T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32617
published_at 2026-04-02T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32652
published_at 2026-04-04T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32475
published_at 2026-04-07T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32522
published_at 2026-04-16T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32549
published_at 2026-04-09T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32553
published_at 2026-04-11T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32515
published_at 2026-04-12T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32488
published_at 2026-04-13T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.325
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2489
2
reference_url http://secunia.com/advisories/40442
reference_id
reference_type
scores
url http://secunia.com/advisories/40442
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/60135
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/60135
4
reference_url http://svn.ruby-lang.org/repos/ruby/tags/v1_9_1_429/ChangeLog
reference_id
reference_type
scores
url http://svn.ruby-lang.org/repos/ruby/tags/v1_9_1_429/ChangeLog
5
reference_url http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_rc1/ChangeLog
reference_id
reference_type
scores
url http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_rc1/ChangeLog
6
reference_url https://www.ruby-lang.org/en/news/2010/07/02/ruby-1-9-1-p429-is-released
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2010/07/02/ruby-1-9-1-p429-is-released
7
reference_url http://www.openwall.com/lists/oss-security/2010/07/02/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/07/02/1
8
reference_url http://www.openwall.com/lists/oss-security/2010/07/02/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/07/02/10
9
reference_url http://www.osvdb.org/66040
reference_id
reference_type
scores
url http://www.osvdb.org/66040
10
reference_url http://www.ruby-lang.org/en/news/2010/07/02/ruby-1-9-1-p429-is-released/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2010/07/02/ruby-1-9-1-p429-is-released/
11
reference_url http://www.securityfocus.com/bid/41321
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/41321
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2489
reference_id CVE-2010-2489
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-2489
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score7.2 - 7.2
Exploitability0.5
Weighted_severity6.5
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e58n-x5ra-6ybq