Show filters
264 Total Results
Displaying 21-30 of 264
Sort by:
Attacker Value
Unknown

CVE-2022-36563

Disclosure Date: August 30, 2022 (last updated October 08, 2023)
Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
Attacker Value
Unknown

CVE-2022-36562

Disclosure Date: August 30, 2022 (last updated October 08, 2023)
Incorrect access control in the install directory (C:\Ruby31-x64) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
Attacker Value
Unknown

CVE-2021-3779

Disclosure Date: June 28, 2022 (last updated October 07, 2023)
A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.
Attacker Value
Unknown

CVE-2022-1934

Disclosure Date: May 31, 2022 (last updated October 07, 2023)
Use After Free in GitHub repository mruby/mruby prior to 3.2.
Attacker Value
Unknown

CVE-2022-29218

Disclosure Date: May 13, 2022 (last updated October 07, 2023)
RubyGems is a package registry used to supply software for the Ruby language ecosystem. An ordering mistake in the code that accepts gem uploads allowed some gems (with platforms ending in numbers, like `arm64-darwin-21`) to be temporarily replaced in the CDN cache by a malicious package. The bug has been patched, and is believed to have never been exploited, based on an extensive review of logs and existing gems by rubygems. The easiest way to ensure that an application has not been exploited by this vulnerability is to verify all downloaded .gems checksums match the checksum recorded in the RubyGems.org database. RubyGems.org has been patched and is no longer vulnerable to this issue.
Attacker Value
Unknown

CVE-2022-28738

Disclosure Date: May 09, 2022 (last updated October 07, 2023)
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
Attacker Value
Unknown

CVE-2022-28739

Disclosure Date: May 09, 2022 (last updated January 24, 2024)
There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
Attacker Value
Unknown

CVE-2022-29176

Disclosure Date: May 05, 2022 (last updated October 07, 2023)
Rubygems is a package registry used to supply software for the Ruby language ecosystem. Due to a bug in the yank action, it was possible for any RubyGems.org user to remove and replace certain gems even if that user was not authorized to do so. To be vulnerable, a gem needed: one or more dashes in its name creation within 30 days OR no updates for over 100 days At present, we believe this vulnerability has not been exploited. RubyGems.org sends an email to all gem owners when a gem version is published or yanked. We have not received any support emails from gem owners indicating that their gem has been yanked without authorization. An audit of gem changes for the last 18 months did not find any examples of this vulnerability being used in a malicious way. A deeper audit for any possible use of this exploit is ongoing, and we will update this advisory once it is complete. Using Bundler in --frozen or --deployment mode in CI and during deploys, as the Bundler team has always recommended…
Attacker Value
Unknown

CVE-2022-1427

Disclosure Date: April 23, 2022 (last updated October 07, 2023)
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
Attacker Value
Unknown

CVE-2022-1286

Disclosure Date: April 10, 2022 (last updated October 07, 2023)
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.