Show filters
38 Total Results
Displaying 1-10 of 38
Sort by:
Attacker Value
Unknown

CVE-2011-3624

Disclosure Date: November 26, 2019 (last updated November 27, 2024)
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
Attacker Value
Unknown

CVE-2011-5330

Disclosure Date: November 18, 2019 (last updated November 27, 2024)
Distributed Ruby (aka DRuby) 1.8 mishandles the sending of syscalls.
Attacker Value
Unknown

CVE-2011-5331

Disclosure Date: November 18, 2019 (last updated November 27, 2024)
Distributed Ruby (aka DRuby) 1.8 mishandles instance_eval.
Attacker Value
Unknown

CVE-2009-5147

Disclosure Date: March 29, 2017 (last updated November 26, 2024)
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
0
Attacker Value
Unknown

CVE-2013-4164

Disclosure Date: November 23, 2013 (last updated October 05, 2023)
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
0
Attacker Value
Unknown

CVE-2013-4287

Disclosure Date: October 17, 2013 (last updated October 05, 2023)
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
0
Attacker Value
Unknown

CVE-2013-4363

Disclosure Date: October 17, 2013 (last updated October 05, 2023)
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
0
Attacker Value
Unknown

CVE-2013-4073

Disclosure Date: August 18, 2013 (last updated October 05, 2023)
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
0
Attacker Value
Unknown

CVE-2012-4481

Disclosure Date: May 02, 2013 (last updated November 08, 2023)
The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
0
Attacker Value
Unknown

CVE-2012-4466

Disclosure Date: April 25, 2013 (last updated October 05, 2023)
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
0