Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-a15m-bcma-vfa7
Summary
Multiple vulnerabilities have been discovered in Ruby that allow for
    attacks including arbitrary code execution and Denial of Service.
Aliases
0
alias CVE-2008-3656
1
alias GHSA-823x-6r7f-v9x6
Fixed_packages
0
url pkg:ebuild/dev-lang/ruby@1.8.6_p287-r1
purl pkg:ebuild/dev-lang/ruby@1.8.6_p287-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/ruby@1.8.6_p287-r1
Affected_packages
0
url pkg:rpm/redhat/ruby@1.8.1-7.el4_7?arch=1
purl pkg:rpm/redhat/ruby@1.8.1-7.el4_7?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-a15m-bcma-vfa7
2
vulnerability VCID-fw7k-88kf-1kgg
3
vulnerability VCID-m6vt-b9kt-93hw
4
vulnerability VCID-pegr-f5mh-ekdz
5
vulnerability VCID-qjwb-ph9u-bubf
6
vulnerability VCID-r8r3-3x8p-ebh5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.1-7.el4_7%3Farch=1
1
url pkg:rpm/redhat/ruby@1.8.5-5.el5_2?arch=5
purl pkg:rpm/redhat/ruby@1.8.5-5.el5_2?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-a15m-bcma-vfa7
2
vulnerability VCID-fw7k-88kf-1kgg
3
vulnerability VCID-m6vt-b9kt-93hw
4
vulnerability VCID-pegr-f5mh-ekdz
5
vulnerability VCID-qjwb-ph9u-bubf
6
vulnerability VCID-r8r3-3x8p-ebh5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby@1.8.5-5.el5_2%3Farch=5
2
url pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1?arch=hum1
purl pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vp9-6q85-5ffv
1
vulnerability VCID-2sv2-6snv-2bd3
2
vulnerability VCID-4qm3-nbsk-73he
3
vulnerability VCID-4yvc-uzev-wua4
4
vulnerability VCID-5bte-uex2-f7du
5
vulnerability VCID-5xez-skrj-b3h4
6
vulnerability VCID-6dxj-me8k-qfak
7
vulnerability VCID-91b7-xx8t-rqhr
8
vulnerability VCID-9gp6-pvw1-ufhs
9
vulnerability VCID-9x9w-2k98-wydm
10
vulnerability VCID-a15m-bcma-vfa7
11
vulnerability VCID-ar57-vndq-yka6
12
vulnerability VCID-arjz-geyr-q7e3
13
vulnerability VCID-bdar-wgfe-qqgf
14
vulnerability VCID-c9sy-czbr-tfer
15
vulnerability VCID-cvs2-zecm-z3h8
16
vulnerability VCID-dh8q-zyat-43ce
17
vulnerability VCID-ea13-mua4-1fb9
18
vulnerability VCID-fw7k-88kf-1kgg
19
vulnerability VCID-g1eu-mgx8-j3dw
20
vulnerability VCID-g7ju-q41v-wyhd
21
vulnerability VCID-jj3a-fpsa-a7at
22
vulnerability VCID-jx79-wpg7-2yaa
23
vulnerability VCID-mzqm-gc4w-fbfp
24
vulnerability VCID-nxub-6qsu-hbhk
25
vulnerability VCID-pegr-f5mh-ekdz
26
vulnerability VCID-qyz5-zmnt-qucy
27
vulnerability VCID-rwak-wvuw-qbcg
28
vulnerability VCID-sf98-mryd-yfb3
29
vulnerability VCID-sfzh-hn56-hbak
30
vulnerability VCID-t9y5-hd9b-bkc4
31
vulnerability VCID-vcz9-dvf4-47am
32
vulnerability VCID-wzdf-d9fv-u3hh
33
vulnerability VCID-x126-x9qm-e7d3
34
vulnerability VCID-xkd6-jvma-skfk
35
vulnerability VCID-y56y-5am7-wkhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-3-main@3.3.10-23.1%3Farch=hum1
3
url pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1?arch=hum1
purl pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vp9-6q85-5ffv
1
vulnerability VCID-2sv2-6snv-2bd3
2
vulnerability VCID-4qm3-nbsk-73he
3
vulnerability VCID-4yvc-uzev-wua4
4
vulnerability VCID-5bte-uex2-f7du
5
vulnerability VCID-5xez-skrj-b3h4
6
vulnerability VCID-6dxj-me8k-qfak
7
vulnerability VCID-91b7-xx8t-rqhr
8
vulnerability VCID-9gp6-pvw1-ufhs
9
vulnerability VCID-9x9w-2k98-wydm
10
vulnerability VCID-a15m-bcma-vfa7
11
vulnerability VCID-ar57-vndq-yka6
12
vulnerability VCID-arjz-geyr-q7e3
13
vulnerability VCID-bdar-wgfe-qqgf
14
vulnerability VCID-c9sy-czbr-tfer
15
vulnerability VCID-cvs2-zecm-z3h8
16
vulnerability VCID-dh8q-zyat-43ce
17
vulnerability VCID-ea13-mua4-1fb9
18
vulnerability VCID-fw7k-88kf-1kgg
19
vulnerability VCID-g1eu-mgx8-j3dw
20
vulnerability VCID-g7ju-q41v-wyhd
21
vulnerability VCID-jj3a-fpsa-a7at
22
vulnerability VCID-jx79-wpg7-2yaa
23
vulnerability VCID-mzqm-gc4w-fbfp
24
vulnerability VCID-nxub-6qsu-hbhk
25
vulnerability VCID-pegr-f5mh-ekdz
26
vulnerability VCID-qyz5-zmnt-qucy
27
vulnerability VCID-rwak-wvuw-qbcg
28
vulnerability VCID-sf98-mryd-yfb3
29
vulnerability VCID-sfzh-hn56-hbak
30
vulnerability VCID-t9y5-hd9b-bkc4
31
vulnerability VCID-vcz9-dvf4-47am
32
vulnerability VCID-wzdf-d9fv-u3hh
33
vulnerability VCID-x126-x9qm-e7d3
34
vulnerability VCID-xkd6-jvma-skfk
35
vulnerability VCID-y56y-5am7-wkhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby3-4-main@3.4.8-31.1%3Farch=hum1
4
url pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3?arch=hum1
purl pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3?arch=hum1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vp9-6q85-5ffv
1
vulnerability VCID-2sv2-6snv-2bd3
2
vulnerability VCID-4qm3-nbsk-73he
3
vulnerability VCID-4yvc-uzev-wua4
4
vulnerability VCID-5bte-uex2-f7du
5
vulnerability VCID-5xez-skrj-b3h4
6
vulnerability VCID-6dxj-me8k-qfak
7
vulnerability VCID-91b7-xx8t-rqhr
8
vulnerability VCID-9gp6-pvw1-ufhs
9
vulnerability VCID-9x9w-2k98-wydm
10
vulnerability VCID-a15m-bcma-vfa7
11
vulnerability VCID-ar57-vndq-yka6
12
vulnerability VCID-arjz-geyr-q7e3
13
vulnerability VCID-bdar-wgfe-qqgf
14
vulnerability VCID-c9sy-czbr-tfer
15
vulnerability VCID-cvs2-zecm-z3h8
16
vulnerability VCID-dh8q-zyat-43ce
17
vulnerability VCID-ea13-mua4-1fb9
18
vulnerability VCID-fw7k-88kf-1kgg
19
vulnerability VCID-g1eu-mgx8-j3dw
20
vulnerability VCID-g7ju-q41v-wyhd
21
vulnerability VCID-jj3a-fpsa-a7at
22
vulnerability VCID-jx79-wpg7-2yaa
23
vulnerability VCID-mzqm-gc4w-fbfp
24
vulnerability VCID-nxub-6qsu-hbhk
25
vulnerability VCID-pegr-f5mh-ekdz
26
vulnerability VCID-qyz5-zmnt-qucy
27
vulnerability VCID-rwak-wvuw-qbcg
28
vulnerability VCID-sf98-mryd-yfb3
29
vulnerability VCID-sfzh-hn56-hbak
30
vulnerability VCID-t9y5-hd9b-bkc4
31
vulnerability VCID-vcz9-dvf4-47am
32
vulnerability VCID-wzdf-d9fv-u3hh
33
vulnerability VCID-x126-x9qm-e7d3
34
vulnerability VCID-xkd6-jvma-skfk
35
vulnerability VCID-y56y-5am7-wkhr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby4-0-main@4.0.0-33.3%3Farch=hum1
5
url pkg:ruby/ruby@1.8.7
purl pkg:ruby/ruby@1.8.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4yvc-uzev-wua4
1
vulnerability VCID-5bte-uex2-f7du
2
vulnerability VCID-8fbf-8fea-27d9
3
vulnerability VCID-94vg-kqhg-qfdv
4
vulnerability VCID-9gp6-pvw1-ufhs
5
vulnerability VCID-9ukz-9357-aqb6
6
vulnerability VCID-a15m-bcma-vfa7
7
vulnerability VCID-bv9s-j5yk-m3aw
8
vulnerability VCID-c9sy-czbr-tfer
9
vulnerability VCID-ea13-mua4-1fb9
10
vulnerability VCID-fw7k-88kf-1kgg
11
vulnerability VCID-jx79-wpg7-2yaa
12
vulnerability VCID-mzqm-gc4w-fbfp
13
vulnerability VCID-nsa4-b31c-37g2
14
vulnerability VCID-pegr-f5mh-ekdz
15
vulnerability VCID-qjwb-ph9u-bubf
16
vulnerability VCID-xtny-ychb-fff1
17
vulnerability VCID-ynyp-ybd9-57df
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.8.7
6
url pkg:ruby/ruby@1.8.8
purl pkg:ruby/ruby@1.8.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ww6-w1k6-xqbp
1
vulnerability VCID-4yvc-uzev-wua4
2
vulnerability VCID-5bte-uex2-f7du
3
vulnerability VCID-8fbf-8fea-27d9
4
vulnerability VCID-9gp6-pvw1-ufhs
5
vulnerability VCID-9ukz-9357-aqb6
6
vulnerability VCID-a15m-bcma-vfa7
7
vulnerability VCID-ar57-vndq-yka6
8
vulnerability VCID-bjts-v9q2-9yg8
9
vulnerability VCID-bv9s-j5yk-m3aw
10
vulnerability VCID-c9sy-czbr-tfer
11
vulnerability VCID-ea13-mua4-1fb9
12
vulnerability VCID-fw7k-88kf-1kgg
13
vulnerability VCID-jx79-wpg7-2yaa
14
vulnerability VCID-mzqm-gc4w-fbfp
15
vulnerability VCID-nsa4-b31c-37g2
16
vulnerability VCID-nxub-6qsu-hbhk
17
vulnerability VCID-pegr-f5mh-ekdz
18
vulnerability VCID-qjwb-ph9u-bubf
19
vulnerability VCID-r8r3-3x8p-ebh5
20
vulnerability VCID-rh8q-s45v-xbhg
21
vulnerability VCID-weh8-bs3g-a3hp
22
vulnerability VCID-xtny-ychb-fff1
resource_url http://public2.vulnerablecode.io/packages/pkg:ruby/ruby@1.8.8
References
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401
1
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3656.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3656
reference_id
reference_type
scores
0
value 0.65085
scoring_system epss
scoring_elements 0.98499
published_at 2026-05-14T12:55:00Z
1
value 0.65085
scoring_system epss
scoring_elements 0.98483
published_at 2026-04-16T12:55:00Z
2
value 0.65085
scoring_system epss
scoring_elements 0.98484
published_at 2026-04-21T12:55:00Z
3
value 0.65085
scoring_system epss
scoring_elements 0.98488
published_at 2026-04-29T12:55:00Z
4
value 0.65085
scoring_system epss
scoring_elements 0.98493
published_at 2026-05-11T12:55:00Z
5
value 0.65085
scoring_system epss
scoring_elements 0.98496
published_at 2026-05-09T12:55:00Z
6
value 0.65085
scoring_system epss
scoring_elements 0.98495
published_at 2026-05-12T12:55:00Z
7
value 0.68786
scoring_system epss
scoring_elements 0.98611
published_at 2026-04-01T12:55:00Z
8
value 0.68786
scoring_system epss
scoring_elements 0.98626
published_at 2026-04-13T12:55:00Z
9
value 0.68786
scoring_system epss
scoring_elements 0.98625
published_at 2026-04-12T12:55:00Z
10
value 0.68786
scoring_system epss
scoring_elements 0.98613
published_at 2026-04-02T12:55:00Z
11
value 0.68786
scoring_system epss
scoring_elements 0.98616
published_at 2026-04-04T12:55:00Z
12
value 0.68786
scoring_system epss
scoring_elements 0.98618
published_at 2026-04-07T12:55:00Z
13
value 0.68786
scoring_system epss
scoring_elements 0.9862
published_at 2026-04-08T12:55:00Z
14
value 0.68786
scoring_system epss
scoring_elements 0.98622
published_at 2026-04-09T12:55:00Z
15
value 0.68786
scoring_system epss
scoring_elements 0.98624
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3656
4
reference_url http://secunia.com/advisories/31430
reference_id
reference_type
scores
url http://secunia.com/advisories/31430
5
reference_url http://secunia.com/advisories/31697
reference_id
reference_type
scores
url http://secunia.com/advisories/31697
6
reference_url http://secunia.com/advisories/32165
reference_id
reference_type
scores
url http://secunia.com/advisories/32165
7
reference_url http://secunia.com/advisories/32219
reference_id
reference_type
scores
url http://secunia.com/advisories/32219
8
reference_url http://secunia.com/advisories/32255
reference_id
reference_type
scores
url http://secunia.com/advisories/32255
9
reference_url http://secunia.com/advisories/32256
reference_id
reference_type
scores
url http://secunia.com/advisories/32256
10
reference_url http://secunia.com/advisories/32371
reference_id
reference_type
scores
url http://secunia.com/advisories/32371
11
reference_url http://secunia.com/advisories/33178
reference_id
reference_type
scores
url http://secunia.com/advisories/33178
12
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
13
reference_url http://security.gentoo.org/glsa/glsa-200812-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-17.xml
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44371
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44371
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3656
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3656
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9682
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9682
17
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
18
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm
19
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html
20
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html
21
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264
22
reference_url http://www.debian.org/security/2008/dsa-1651
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1651
23
reference_url http://www.debian.org/security/2008/dsa-1652
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1652
24
reference_url http://www.redhat.com/support/errata/RHSA-2008-0897.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0897.html
25
reference_url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
reference_id
reference_type
scores
url http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/
26
reference_url http://www.securityfocus.com/archive/1/495884/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495884/100/0/threaded
27
reference_url http://www.securityfocus.com/bid/30644
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30644
28
reference_url http://www.securitytracker.com/id?1020654
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020654
29
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
30
reference_url http://www.vupen.com/english/advisories/2008/2334
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2334
31
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=458953
reference_id 458953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=458953
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
76
reference_url https://www.securityfocus.com/bid/30644/info
reference_id CVE-2008-3657;OSVDB-47472;CVE-2008-3655;OSVDB-47470
reference_type exploit
scores
url https://www.securityfocus.com/bid/30644/info
77
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/32222.rb
reference_id CVE-2008-4310;OSVDB-47471;CVE-2008-3656
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/32222.rb
78
reference_url https://security.gentoo.org/glsa/200812-17
reference_id GLSA-200812-17
reference_type
scores
url https://security.gentoo.org/glsa/200812-17
79
reference_url https://access.redhat.com/errata/RHSA-2008:0897
reference_id RHSA-2008:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0897
80
reference_url https://access.redhat.com/errata/RHSA-2026:7305
reference_id RHSA-2026:7305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7305
81
reference_url https://access.redhat.com/errata/RHSA-2026:7307
reference_id RHSA-2026:7307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7307
82
reference_url https://access.redhat.com/errata/RHSA-2026:8838
reference_id RHSA-2026:8838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8838
83
reference_url https://usn.ubuntu.com/651-1/
reference_id USN-651-1
reference_type
scores
url https://usn.ubuntu.com/651-1/
Weaknesses
0
cwe_id 399
name Resource Management Errors
description Weaknesses in this category are related to improper management of system resources.
Exploits
0
date_added null
description
The WEBrick::HTTP::DefaultFileHandler in WEBrick in
          Ruby 1.8.5 and earlier, 1.8.6 to 1.8.6-p286, 1.8.7
          to 1.8.7-p71, and 1.9 to r18423 allows for a DoS
          (CPU consumption) via a crafted HTTP request.
required_action null
due_date null
notes
Stability:
  - crash-service-down
SideEffects: []
Reliability: []
known_ransomware_campaign_use false
source_date_published 2008-08-08
exploit_type null
platform
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/http/webrick_regex.rb
1
date_added 2008-08-11
description Ruby 1.9 - 'WEBrick::HTTP::DefaultFileHandler' Crafted HTTP Request Denial of Service
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2008-08-11
exploit_type dos
platform multiple
source_date_updated 2016-12-21
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/30644/info
Severity_range_score7.8 - 7.8
Exploitability2.0
Weighted_severity7.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-a15m-bcma-vfa7