Show filters
104 Total Results
Displaying 11-20 of 104
Sort by:
Attacker Value
Unknown

CVE-2022-28738

Disclosure Date: May 09, 2022 (last updated October 07, 2023)
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
Attacker Value
Unknown

CVE-2022-28739

Disclosure Date: May 09, 2022 (last updated January 24, 2024)
There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
Attacker Value
Unknown

CVE-2021-41816

Disclosure Date: February 06, 2022 (last updated October 07, 2023)
CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.
Attacker Value
Unknown

CVE-2021-41819

Disclosure Date: January 01, 2022 (last updated October 07, 2023)
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
Attacker Value
Unknown

CVE-2021-41817

Disclosure Date: January 01, 2022 (last updated October 07, 2023)
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
Attacker Value
Unknown

CVE-2021-28966

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
In Ruby through 3.0 on Windows, a remote attacker can submit a crafted path when a Web application handles a parameter with TmpDir.
Attacker Value
Unknown

CVE-2021-31810

Disclosure Date: July 13, 2021 (last updated February 23, 2025)
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
Attacker Value
Unknown

CVE-2021-28965

Disclosure Date: April 21, 2021 (last updated February 22, 2025)
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
Attacker Value
Unknown

CVE-2020-25613

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
Attacker Value
Unknown

CVE-2020-10933

Disclosure Date: May 04, 2020 (last updated February 21, 2025)
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.