Show filters
264 Total Results
Displaying 11-20 of 264
Sort by:
Attacker Value
Unknown

CVE-2023-1125

Disclosure Date: May 02, 2023 (last updated October 08, 2023)
The Ruby Help Desk WordPress plugin before 1.3.4 does not ensure that the ticket being modified belongs to the user making the request, allowing an attacker to close and/or add files and replies to tickets other than their own.
Attacker Value
Unknown

CVE-2023-28756

Disclosure Date: March 31, 2023 (last updated October 08, 2023)
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Attacker Value
Unknown

CVE-2021-46023

Disclosure Date: February 14, 2023 (last updated October 08, 2023)
An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby before 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Attacker Value
Unknown

CVE-2022-47318

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
Attacker Value
Unknown

CVE-2022-46648

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.
Attacker Value
Unknown

CVE-2022-45301

Disclosure Date: November 29, 2022 (last updated October 08, 2023)
Insecure permissions in Chocolatey Ruby package v3.1.2.1 and below grants all users in the Authenticated Users group write privileges for the path C:\tools\ruby31 and all files located in that folder.
Attacker Value
Unknown

CVE-2021-33621

Disclosure Date: November 18, 2022 (last updated November 08, 2023)
The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
Attacker Value
Unknown

CVE-2016-2338

Disclosure Date: September 29, 2022 (last updated October 08, 2023)
An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array size after mentioned allocation and cause heap overflow.
Attacker Value
Unknown

CVE-2022-39224

Disclosure Date: September 21, 2022 (last updated October 08, 2023)
Arr-pm is an RPM reader/writer library written in Ruby. Versions prior to 0.0.12 are subject to OS command injection resulting in shell execution if the RPM contains a malicious "payload compressor" field. This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class of this library. Version 0.0.12 patches these issues. A workaround for this issue is to ensure any RPMs being processed contain valid/known payload compressor values such as gzip, bzip2, xz, zstd, and lzma. The payload compressor field in an rpm can be checked by using the rpm command line tool.
Attacker Value
Unknown

CVE-2022-36073

Disclosure Date: September 07, 2022 (last updated October 08, 2023)
RubyGems.org is the Ruby community gem host. A bug in password & email change confirmation code allowed an attacker to change their RubyGems.org account's email to an unowned email address. Having access to an account whose email has been changed could enable an attacker to save API keys for that account, and when a legitimate user attempts to create an account with their email (and has to reset password to gain access) and is granted access to other gems, the attacker would then be able to publish and yank versions of those gems. Commit number 90c9e6aac2d91518b479c51d48275c57de492d4d contains a patch for this issue.