Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
Typeapk
Namespacealpine
Nameruby
Version2.5.1-r0
Qualifiers
arch aarch64
distroversion v3.20
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.5.2-r0
Latest_non_vulnerable_version3.3.10-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1cad-uybu-2uau
vulnerability_id VCID-1cad-uybu-2uau
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17742.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17742
reference_id
reference_type
scores
0
value 0.01152
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-29T12:55:00Z
1
value 0.01152
scoring_system epss
scoring_elements 0.78524
published_at 2026-04-21T12:55:00Z
2
value 0.01152
scoring_system epss
scoring_elements 0.78556
published_at 2026-04-24T12:55:00Z
3
value 0.01152
scoring_system epss
scoring_elements 0.78564
published_at 2026-04-26T12:55:00Z
4
value 0.01152
scoring_system epss
scoring_elements 0.7845
published_at 2026-04-01T12:55:00Z
5
value 0.01152
scoring_system epss
scoring_elements 0.78456
published_at 2026-04-02T12:55:00Z
6
value 0.01152
scoring_system epss
scoring_elements 0.78487
published_at 2026-04-04T12:55:00Z
7
value 0.01152
scoring_system epss
scoring_elements 0.7847
published_at 2026-04-07T12:55:00Z
8
value 0.01152
scoring_system epss
scoring_elements 0.78497
published_at 2026-04-08T12:55:00Z
9
value 0.01152
scoring_system epss
scoring_elements 0.78502
published_at 2026-04-09T12:55:00Z
10
value 0.01152
scoring_system epss
scoring_elements 0.78527
published_at 2026-04-18T12:55:00Z
11
value 0.01152
scoring_system epss
scoring_elements 0.78508
published_at 2026-04-12T12:55:00Z
12
value 0.01152
scoring_system epss
scoring_elements 0.785
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17742
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-17742
19
reference_url https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561952
reference_id 1561952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561952
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
reference_id 972230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972230
22
reference_url https://access.redhat.com/errata/RHSA-2020:1963
reference_id RHSA-2020:1963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1963
23
reference_url https://access.redhat.com/errata/RHSA-2020:2212
reference_id RHSA-2020:2212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2212
24
reference_url https://access.redhat.com/errata/RHSA-2020:2288
reference_id RHSA-2020:2288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2288
fixed_packages
0
url pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main
aliases CVE-2017-17742, GHSA-7p4c-jf2w-hc3w
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cad-uybu-2uau
1
url VCID-bad1-7aa4-cugv
vulnerability_id VCID-bad1-7aa4-cugv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6914.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6914.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6914
reference_id
reference_type
scores
0
value 0.02372
scoring_system epss
scoring_elements 0.84884
published_at 2026-04-01T12:55:00Z
1
value 0.02372
scoring_system epss
scoring_elements 0.85013
published_at 2026-04-29T12:55:00Z
2
value 0.02372
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-24T12:55:00Z
3
value 0.02372
scoring_system epss
scoring_elements 0.85014
published_at 2026-04-26T12:55:00Z
4
value 0.02372
scoring_system epss
scoring_elements 0.849
published_at 2026-04-02T12:55:00Z
5
value 0.02372
scoring_system epss
scoring_elements 0.84918
published_at 2026-04-04T12:55:00Z
6
value 0.02372
scoring_system epss
scoring_elements 0.84922
published_at 2026-04-07T12:55:00Z
7
value 0.02372
scoring_system epss
scoring_elements 0.84945
published_at 2026-04-08T12:55:00Z
8
value 0.02372
scoring_system epss
scoring_elements 0.84952
published_at 2026-04-09T12:55:00Z
9
value 0.02372
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-11T12:55:00Z
10
value 0.02372
scoring_system epss
scoring_elements 0.84966
published_at 2026-04-12T12:55:00Z
11
value 0.02372
scoring_system epss
scoring_elements 0.84961
published_at 2026-04-13T12:55:00Z
12
value 0.02372
scoring_system epss
scoring_elements 0.84982
published_at 2026-04-16T12:55:00Z
13
value 0.02372
scoring_system epss
scoring_elements 0.84984
published_at 2026-04-18T12:55:00Z
14
value 0.02372
scoring_system epss
scoring_elements 0.84981
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6914
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561947
reference_id 1561947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561947
20
reference_url https://usn.ubuntu.com/3626-1/
reference_id USN-3626-1
reference_type
scores
url https://usn.ubuntu.com/3626-1/
fixed_packages
0
url pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main
aliases CVE-2018-6914, GHSA-wpg3-wgm5-rv8w
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bad1-7aa4-cugv
2
url VCID-qyz5-zmnt-qucy
vulnerability_id VCID-qyz5-zmnt-qucy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8780
reference_id
reference_type
scores
0
value 0.01344
scoring_system epss
scoring_elements 0.80001
published_at 2026-04-01T12:55:00Z
1
value 0.01344
scoring_system epss
scoring_elements 0.8013
published_at 2026-04-29T12:55:00Z
2
value 0.01344
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-24T12:55:00Z
3
value 0.01344
scoring_system epss
scoring_elements 0.80114
published_at 2026-04-26T12:55:00Z
4
value 0.01344
scoring_system epss
scoring_elements 0.80009
published_at 2026-04-02T12:55:00Z
5
value 0.01344
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-04T12:55:00Z
6
value 0.01344
scoring_system epss
scoring_elements 0.8002
published_at 2026-04-07T12:55:00Z
7
value 0.01344
scoring_system epss
scoring_elements 0.80048
published_at 2026-04-08T12:55:00Z
8
value 0.01344
scoring_system epss
scoring_elements 0.80057
published_at 2026-04-09T12:55:00Z
9
value 0.01344
scoring_system epss
scoring_elements 0.80076
published_at 2026-04-11T12:55:00Z
10
value 0.01344
scoring_system epss
scoring_elements 0.80061
published_at 2026-04-12T12:55:00Z
11
value 0.01344
scoring_system epss
scoring_elements 0.80052
published_at 2026-04-13T12:55:00Z
12
value 0.01344
scoring_system epss
scoring_elements 0.8008
published_at 2026-04-18T12:55:00Z
13
value 0.01344
scoring_system epss
scoring_elements 0.80081
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561949
reference_id 1561949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561949
20
reference_url https://access.redhat.com/errata/RHSA-2026:7305
reference_id RHSA-2026:7305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7305
21
reference_url https://access.redhat.com/errata/RHSA-2026:7307
reference_id RHSA-2026:7307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7307
22
reference_url https://access.redhat.com/errata/RHSA-2026:8838
reference_id RHSA-2026:8838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8838
23
reference_url https://usn.ubuntu.com/3626-1/
reference_id USN-3626-1
reference_type
scores
url https://usn.ubuntu.com/3626-1/
fixed_packages
0
url pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main
aliases CVE-2018-8780, GHSA-fphx-j9v2-w2cx
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qyz5-zmnt-qucy
3
url VCID-rdme-1q3s-43d8
vulnerability_id VCID-rdme-1q3s-43d8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8777.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8777
reference_id
reference_type
scores
0
value 0.01449
scoring_system epss
scoring_elements 0.80846
published_at 2026-04-29T12:55:00Z
1
value 0.01449
scoring_system epss
scoring_elements 0.80765
published_at 2026-04-13T12:55:00Z
2
value 0.01449
scoring_system epss
scoring_elements 0.80802
published_at 2026-04-16T12:55:00Z
3
value 0.01449
scoring_system epss
scoring_elements 0.80805
published_at 2026-04-18T12:55:00Z
4
value 0.01449
scoring_system epss
scoring_elements 0.80806
published_at 2026-04-21T12:55:00Z
5
value 0.01449
scoring_system epss
scoring_elements 0.80828
published_at 2026-04-24T12:55:00Z
6
value 0.01449
scoring_system epss
scoring_elements 0.80834
published_at 2026-04-26T12:55:00Z
7
value 0.01864
scoring_system epss
scoring_elements 0.83053
published_at 2026-04-09T12:55:00Z
8
value 0.01864
scoring_system epss
scoring_elements 0.83069
published_at 2026-04-11T12:55:00Z
9
value 0.01864
scoring_system epss
scoring_elements 0.83063
published_at 2026-04-12T12:55:00Z
10
value 0.01864
scoring_system epss
scoring_elements 0.83021
published_at 2026-04-07T12:55:00Z
11
value 0.01864
scoring_system epss
scoring_elements 0.83046
published_at 2026-04-08T12:55:00Z
12
value 0.01864
scoring_system epss
scoring_elements 0.82993
published_at 2026-04-01T12:55:00Z
13
value 0.01864
scoring_system epss
scoring_elements 0.8301
published_at 2026-04-02T12:55:00Z
14
value 0.01864
scoring_system epss
scoring_elements 0.83023
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561950
reference_id 1561950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561950
fixed_packages
0
url pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main
aliases CVE-2018-8777, GHSA-9j6f-82h4-9mw2
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rdme-1q3s-43d8
4
url VCID-y29u-wpkt-rkgp
vulnerability_id VCID-y29u-wpkt-rkgp
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8779.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8779
reference_id
reference_type
scores
0
value 0.01284
scoring_system epss
scoring_elements 0.79555
published_at 2026-04-01T12:55:00Z
1
value 0.01284
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-29T12:55:00Z
2
value 0.01284
scoring_system epss
scoring_elements 0.79667
published_at 2026-04-24T12:55:00Z
3
value 0.01284
scoring_system epss
scoring_elements 0.79674
published_at 2026-04-26T12:55:00Z
4
value 0.01284
scoring_system epss
scoring_elements 0.79561
published_at 2026-04-02T12:55:00Z
5
value 0.01284
scoring_system epss
scoring_elements 0.79584
published_at 2026-04-04T12:55:00Z
6
value 0.01284
scoring_system epss
scoring_elements 0.79571
published_at 2026-04-07T12:55:00Z
7
value 0.01284
scoring_system epss
scoring_elements 0.79599
published_at 2026-04-08T12:55:00Z
8
value 0.01284
scoring_system epss
scoring_elements 0.79607
published_at 2026-04-09T12:55:00Z
9
value 0.01284
scoring_system epss
scoring_elements 0.79628
published_at 2026-04-11T12:55:00Z
10
value 0.01284
scoring_system epss
scoring_elements 0.79612
published_at 2026-04-12T12:55:00Z
11
value 0.01284
scoring_system epss
scoring_elements 0.79604
published_at 2026-04-13T12:55:00Z
12
value 0.01284
scoring_system epss
scoring_elements 0.79634
published_at 2026-04-18T12:55:00Z
13
value 0.01284
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561948
reference_id 1561948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561948
20
reference_url https://usn.ubuntu.com/3626-1/
reference_id USN-3626-1
reference_type
scores
url https://usn.ubuntu.com/3626-1/
fixed_packages
0
url pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main
aliases CVE-2018-8779
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y29u-wpkt-rkgp
5
url VCID-zwxw-299r-wfgx
vulnerability_id VCID-zwxw-299r-wfgx
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8778.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8778
reference_id
reference_type
scores
0
value 0.00537
scoring_system epss
scoring_elements 0.67565
published_at 2026-04-29T12:55:00Z
1
value 0.00537
scoring_system epss
scoring_elements 0.67555
published_at 2026-04-18T12:55:00Z
2
value 0.00537
scoring_system epss
scoring_elements 0.67534
published_at 2026-04-21T12:55:00Z
3
value 0.00537
scoring_system epss
scoring_elements 0.67564
published_at 2026-04-26T12:55:00Z
4
value 0.00537
scoring_system epss
scoring_elements 0.67429
published_at 2026-04-01T12:55:00Z
5
value 0.00537
scoring_system epss
scoring_elements 0.67465
published_at 2026-04-07T12:55:00Z
6
value 0.00537
scoring_system epss
scoring_elements 0.67486
published_at 2026-04-04T12:55:00Z
7
value 0.00537
scoring_system epss
scoring_elements 0.67516
published_at 2026-04-08T12:55:00Z
8
value 0.00537
scoring_system epss
scoring_elements 0.67531
published_at 2026-04-09T12:55:00Z
9
value 0.00537
scoring_system epss
scoring_elements 0.67553
published_at 2026-04-24T12:55:00Z
10
value 0.00537
scoring_system epss
scoring_elements 0.6754
published_at 2026-04-12T12:55:00Z
11
value 0.00537
scoring_system epss
scoring_elements 0.67507
published_at 2026-04-13T12:55:00Z
12
value 0.00537
scoring_system epss
scoring_elements 0.67543
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8778
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8778
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-8778
19
reference_url https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561953
reference_id 1561953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561953
21
reference_url https://access.redhat.com/errata/RHSA-2020:1963
reference_id RHSA-2020:1963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1963
22
reference_url https://access.redhat.com/errata/RHSA-2020:2212
reference_id RHSA-2020:2212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2212
23
reference_url https://access.redhat.com/errata/RHSA-2020:2288
reference_id RHSA-2020:2288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2288
24
reference_url https://usn.ubuntu.com/3626-1/
reference_id USN-3626-1
reference_type
scores
url https://usn.ubuntu.com/3626-1/
fixed_packages
0
url pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/ruby@2.5.1-r0?arch=aarch64&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main
aliases CVE-2018-8778, GHSA-wvhq-ch4h-8pwr
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zwxw-299r-wfgx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/ruby@2.5.1-r0%3Farch=aarch64&distroversion=v3.20&reponame=main