Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/tfm-rubygem-algebrick@0.7.3-4?arch=el7sat
purl pkg:rpm/redhat/tfm-rubygem-algebrick@0.7.3-4?arch=el7sat
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.4
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-1mw1-384y-huc7
Aliases:
CVE-2013-2099
Uncontrolled Resource Consumption Algorithmic complexity vulnerability in the `ssl.match_hostname` function and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate. There are no reported fixed by versions.
VCID-3ycr-9smk-uqdc
Aliases:
CVE-2015-3225
GHSA-rgr4-9jh5-j4j6
Potential Denial of Service Vulnerability Carefully crafted requests can cause a `SystemStackError` and potentially cause a denial of service attack. There are no reported fixed by versions.
VCID-6xkf-evrx-pyau
Aliases:
CVE-2016-2166
GHSA-f5cf-f7px-xpmh
Exposure of Sensitive Information to an Unauthorized Actor The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors. There are no reported fixed by versions.
VCID-77c9-jb1m-6qe2
Aliases:
CVE-2015-0203
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling There are no reported fixed by versions.
VCID-9gb8-xvrc-aqgb
Aliases:
CVE-2015-0223
qpid-cpp: anonymous access to qpidd cannot be prevented There are no reported fixed by versions.
VCID-fq2t-c2nv-23ce
Aliases:
CVE-2015-1609
A vulnerability in MongoDB can lead to a Denial of Service condition. There are no reported fixed by versions.
VCID-jfqz-9a6e-jff7
Aliases:
CVE-2016-2100
foreman: Unprivileged user can access private bookmarks of other users There are no reported fixed by versions.
VCID-va8w-uzhc-x3bz
Aliases:
CVE-2013-6668
security update There are no reported fixed by versions.
VCID-vhxh-tpay-mbh3
Aliases:
CVE-2015-0224
qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:51:05.364222+00:00 RedHat Importer Affected by VCID-1mw1-384y-huc7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2099.json 38.0.0
2026-04-01T14:48:47.221298+00:00 RedHat Importer Affected by VCID-va8w-uzhc-x3bz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6668.json 38.0.0
2026-04-01T14:44:51.540736+00:00 RedHat Importer Affected by VCID-77c9-jb1m-6qe2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0203.json 38.0.0
2026-04-01T14:44:30.830704+00:00 RedHat Importer Affected by VCID-9gb8-xvrc-aqgb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0223.json 38.0.0
2026-04-01T14:44:25.067661+00:00 RedHat Importer Affected by VCID-vhxh-tpay-mbh3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0224.json 38.0.0
2026-04-01T14:43:24.519367+00:00 RedHat Importer Affected by VCID-jfqz-9a6e-jff7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2100.json 38.0.0
2026-04-01T14:43:19.927700+00:00 RedHat Importer Affected by VCID-fq2t-c2nv-23ce https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1609.json 38.0.0
2026-04-01T14:40:36.881130+00:00 RedHat Importer Affected by VCID-3ycr-9smk-uqdc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3225.json 38.0.0
2026-04-01T14:37:35.975892+00:00 RedHat Importer Affected by VCID-6xkf-evrx-pyau https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2166.json 38.0.0