Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

ruby-lang

About This Vendor

ruby-lang is a technology vendor producing software and infrastructure products. As a software provider, ruby-lang's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of ruby-lang's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 129 known vulnerabilities from ruby-lang. This includes 14 critical-severity issues and 51 high-severity issues that represent significant risk. These vulnerabilities affect 62 distinct products across ruby-lang's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2007 through 2025, indicating decades of continuous security attention and research. Organizations deploying ruby-lang products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-5162 2007-10-01 2025-04-09 - 4.3 Likely
CVE-2007-5770 2007-11-14 2025-04-09 - 5.0 Likely
CVE-2008-1145 2008-03-04 2025-04-09 - 5.0 Likely
CVE-2008-1891 2008-04-18 2025-04-09 - 5.0 Likely
CVE-2008-2662 2008-06-24 2025-04-09 - 10.0 Likely
CVE-2008-2663 2008-06-24 2025-04-09 - 10.0 Likely
CVE-2008-2664 2008-06-24 2025-04-09 - 7.8 Likely
CVE-2008-2725 2008-06-24 2025-04-09 - 7.8 Likely
CVE-2008-2726 2008-06-24 2025-04-09 - 7.8 Likely
CVE-2008-2376 2008-07-09 2025-04-09 - 7.5 Likely
CVE-2008-3655 2008-08-13 2025-04-09 - 7.5 Likely
CVE-2008-3656 2008-08-13 2025-04-09 - 7.8 Likely
CVE-2008-3657 2008-08-13 2025-04-09 - 7.5 Likely
CVE-2008-3443 2008-08-14 2025-04-09 - 5.0 Likely
CVE-2008-3790 2008-08-27 2025-04-09 - 5.0 Likely
CVE-2008-3905 2008-09-04 2025-04-09 - 5.8 Likely
CVE-2008-4310 2008-12-09 2025-04-09 - 7.8 Likely
CVE-2009-0642 2009-02-20 2025-04-09 - 6.8 Likely
CVE-2009-1904 2009-06-11 2025-04-09 - 5.0 Likely
CVE-2009-4124 2009-12-11 2025-04-09 - 10.0 Likely
CVE-2009-4492 2010-01-13 2025-04-09 - 7.5 Likely
CVE-2010-2489 2010-07-12 2025-04-11 - 7.2 Unknown
CVE-2011-1004 2011-03-02 2025-04-11 - 6.3 Unknown
CVE-2011-1005 2011-03-02 2025-04-11 - 5.0 Likely
CVE-2011-0188 2011-03-23 2025-04-11 - 6.8 Likely
CVE-2011-2686 2011-08-05 2025-04-11 - 5.0 Likely
CVE-2011-2705 2011-08-05 2025-04-11 - 5.0 Likely
CVE-2011-3009 2011-08-05 2025-04-11 - 5.0 Likely
CVE-2011-4815 2011-12-30 2025-04-11 - 7.8 Likely
CVE-2012-5380 2012-10-11 2025-04-11 6.7 6.0 Unknown
CVE-2012-4522 2012-11-24 2025-04-11 - 5.0 Likely
CVE-2012-5371 2012-11-28 2025-04-11 - 5.0 Likely
CVE-2013-0256 2013-03-01 2025-04-11 - 4.3 Likely
CVE-2013-1655 2013-03-20 2025-04-11 - 7.5 Likely
CVE-2013-1911 2013-04-03 2025-04-11 - 6.8 Likely
CVE-2013-1821 2013-04-09 2025-04-11 - 5.0 Likely
CVE-2012-4464 2013-04-25 2025-04-11 - 5.0 Likely
CVE-2012-4466 2013-04-25 2025-04-11 - 5.0 Likely
CVE-2013-0175 2013-04-25 2025-04-11 - 7.5 Likely
CVE-2013-0233 2013-04-25 2025-04-11 - 6.8 Likely
CVE-2013-1933 2013-04-25 2025-04-11 - 9.3 Likely
CVE-2013-1947 2013-04-25 2025-04-11 - 9.3 Likely
CVE-2013-1948 2013-04-25 2025-04-11 - 10.0 Likely
CVE-2012-4481 2013-05-02 2025-04-11 - 4.3 Likely
CVE-2013-4073 2013-08-18 2025-04-11 - 6.8 Likely
CVE-2013-5647 2013-08-29 2025-04-11 - 7.5 Likely
CVE-2013-4136 2013-09-30 2025-04-11 - 4.4 Unknown
CVE-2013-4287 2013-10-17 2025-04-11 - 4.3 Likely
CVE-2013-4363 2013-10-17 2025-04-11 - 4.3 Likely
CVE-2013-2065 2013-11-02 2025-04-11 - 6.4 Likely
CVE-2013-4164 2013-11-23 2025-04-11 - 6.8 Likely
CVE-2013-2119 2014-01-03 2025-04-11 - 4.6 Unknown
CVE-2013-4413 2014-03-11 2025-04-12 - 5.0 Likely
CVE-2014-2734 2014-04-24 2025-04-12 - 5.8 Likely
CVE-2014-8080 2014-11-03 2025-04-12 - 5.0 Likely
CVE-2014-4975 2014-11-15 2025-04-12 - 5.0 Likely
CVE-2014-8090 2014-11-21 2025-04-12 - 5.0 Likely
CVE-2015-3900 2015-06-24 2025-04-12 - 5.0 Likely
CVE-2015-7551 2016-03-24 2025-04-12 8.4 4.6 Unknown
CVE-2016-2336 2017-01-06 2025-04-20 9.8 7.5 Likely
CVE-2016-2337 2017-01-06 2025-04-20 9.8 7.5 Likely
CVE-2016-2339 2017-01-06 2025-04-20 9.8 7.5 Likely
CVE-2016-7798 2017-01-30 2025-04-20 7.5 5.0 Likely
CVE-2009-5147 2017-03-29 2025-04-20 7.3 7.5 Likely
CVE-2017-6181 2017-04-03 2025-04-20 7.5 5.0 Likely
CVE-2017-9225 2017-05-24 2025-04-20 9.8 7.5 Likely
CVE-2017-9229 2017-05-24 2025-04-20 7.5 5.0 Likely
CVE-2015-9096 2017-06-12 2025-04-20 6.1 4.3 Likely
CVE-2017-11465 2017-07-19 2025-04-20 9.8 7.5 Likely
CVE-2017-14064 2017-08-31 2025-04-20 9.8 7.5 Likely
CVE-2014-6438 2017-09-06 2025-04-20 7.5 5.0 Likely
CVE-2017-0898 2017-09-15 2025-04-20 9.1 6.4 Likely
CVE-2017-10784 2017-09-19 2025-04-20 8.8 9.3 Likely
CVE-2017-14033 2017-09-19 2025-04-20 7.5 5.0 Likely
CVE-2017-17405 2017-12-15 2025-04-20 8.8 9.3 Likely
CVE-2017-17790 2017-12-20 2025-04-20 9.8 7.5 Likely
CVE-2017-17742 2018-04-03 2024-11-21 5.3 5.0 Likely
CVE-2018-6914 2018-04-03 2024-11-21 7.5 5.0 Likely
CVE-2018-8777 2018-04-03 2024-11-21 7.5 5.0 Likely
CVE-2018-8778 2018-04-03 2024-11-21 7.5 5.0 Likely
CVE-2018-8779 2018-04-03 2024-11-21 7.5 5.0 Likely
CVE-2018-8780 2018-04-03 2024-11-21 9.1 7.5 Likely
CVE-2018-16395 2018-11-16 2024-11-21 9.8 7.5 Likely
CVE-2018-16396 2018-11-16 2024-11-21 8.1 6.8 Likely
CVE-2019-11879 2019-05-10 2024-11-21 5.5 2.1 Unknown
CVE-2013-1945 2019-10-31 2024-11-21 3.3 2.1 Unknown
CVE-2011-3624 2019-11-26 2024-11-21 5.3 5.0 Likely
CVE-2011-4121 2019-11-26 2024-11-21 9.8 7.5 Likely
CVE-2019-15845 2019-11-26 2024-11-21 6.5 6.4 Likely
CVE-2019-16201 2019-11-26 2024-11-21 7.5 7.8 Likely
CVE-2019-16254 2019-11-26 2024-11-21 5.3 5.0 Likely
CVE-2019-16255 2019-11-26 2024-11-21 8.1 6.8 Likely
CVE-2015-1855 2019-11-29 2024-11-21 5.9 4.3 Likely
CVE-2020-8130 2020-02-24 2024-11-21 6.4 6.9 Unknown
CVE-2020-5247 2020-02-28 2024-11-21 6.5 5.0 Likely
CVE-2020-10663 2020-04-28 2024-11-21 7.5 5.0 Likely
CVE-2020-10933 2020-05-04 2024-11-21 5.3 5.0 Likely
CVE-2020-25613 2020-10-06 2024-11-21 7.5 5.0 Likely
CVE-2021-28965 2021-04-21 2024-11-21 7.5 5.0 Likely
CVE-2021-31810 2021-07-13 2024-11-21 5.8 5.0 Likely
CVE-2021-28966 2021-07-30 2024-11-21 7.5 5.0 Likely
CVE-2021-31799 2021-07-30 2024-11-21 7.0 4.4 Unknown
CVE-2021-32066 2021-08-01 2024-11-21 7.4 5.8 Likely
CVE-2021-41817 2022-01-01 2024-11-21 7.5 5.0 Likely
CVE-2021-41819 2022-01-01 2025-05-22 7.5 5.0 Likely
CVE-2021-41816 2022-02-06 2024-11-21 9.8 7.5 Likely
CVE-2022-28738 2022-05-09 2024-11-21 9.8 7.5 Likely
CVE-2022-28739 2022-05-09 2025-11-04 7.5 4.3 Likely
CVE-2016-2338 2022-09-29 2024-11-21 9.8 - -
CVE-2021-33621 2022-11-18 2025-11-04 8.8 - -
CVE-2023-22795 2023-02-09 2024-11-21 7.5 - -
CVE-2023-28755 2023-03-31 2025-11-04 5.3 - -
CVE-2023-28756 2023-03-31 2025-11-04 5.3 - -
CVE-2023-36617 2023-06-29 2025-11-04 5.3 - -
CVE-2024-26142 2024-02-27 2025-02-14 7.5 - -
CVE-2024-35176 2024-05-16 2025-11-03 5.3 - -
CVE-2024-39908 2024-07-16 2025-11-03 4.3 - -
CVE-2024-41123 2024-08-01 2025-11-03 5.3 - -
CVE-2024-41946 2024-08-01 2025-11-03 5.3 - -
CVE-2024-43398 2024-08-22 2025-11-03 5.9 - -
CVE-2024-49761 2024-10-28 2025-11-03 7.5 - -
CVE-2025-27219 2025-03-04 2025-11-03 5.8 - -
CVE-2025-27220 2025-03-04 2025-11-03 4.0 - -
CVE-2025-27221 2025-03-04 2025-11-03 3.2 - -
CVE-2025-27788 2025-03-12 2025-04-02 7.5 - -
CVE-2025-43857 2025-04-28 2025-11-21 6.5 - -
CVE-2025-6442 2025-06-25 2025-08-18 5.9 - -
CVE-2025-58767 2025-09-17 2025-09-30 5.3 - -
CVE-2025-61594 2025-12-30 2026-02-24 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for ruby-lang by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with ruby-lang's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.