Show filters
348 Total Results
Displaying 21-30 of 348
Sort by:
Attacker Value
Unknown

CVE-2024-21654

Disclosure Date: January 12, 2024 (last updated January 23, 2024)
Rubygems.org is the Ruby community's gem hosting service. Rubygems.org users with MFA enabled would normally be protected from account takeover in the case of email account takeover. However, a workaround on the forgotten password form allows an attacker to bypass the MFA requirement and takeover the account. This vulnerability has been patched in commit 0b3272a.
Attacker Value
Unknown

CVE-2009-4123

Disclosure Date: December 12, 2023 (last updated December 15, 2023)
The jruby-openssl gem before 0.6 for JRuby mishandles SSL certificate validation.
Attacker Value
Unknown

CVE-2023-40165

Disclosure Date: August 17, 2023 (last updated October 08, 2023)
rubygems.org is the Ruby community's primary gem (library) hosting service. Insufficient input validation allowed malicious actors to replace any uploaded gem version that had a platform, version number, or gem name matching `/-\d/`, permanently replacing the legitimate upload in the canonical gem storage bucket, and triggering an immediate CDN purge so that the malicious gem would be served immediately. The maintainers have checked all gems matching the `/-\d/` pattern and can confirm that no unexpected `.gem`s were found. As a result, we believe this vulnerability was _not_ exploited. The easiest way to ensure that a user's applications were not exploited by this vulnerability is to check that all of your downloaded .gems have a checksum that matches the checksum recorded in the RubyGems.org database. RubyGems contributor Maciej Mensfeld wrote a tool to automatically check that all downloaded .gem files match the checksums recorded in the RubyGems.org database. You can use it by run…
Attacker Value
Unknown

CVE-2023-36617

Disclosure Date: June 29, 2023 (last updated October 08, 2023)
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
Attacker Value
Unknown

CVE-2021-4360

Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The Controlled Admin Access plugin for WordPress is vulnerable to Privilege Escalation in versions up to, and including, 1.5.5 by not properly restricting access to the configuration page. This makes it possible for attackers to create a new administrator role with unrestricted access.
Attacker Value
Unknown

CVE-2023-1125

Disclosure Date: May 02, 2023 (last updated October 08, 2023)
The Ruby Help Desk WordPress plugin before 1.3.4 does not ensure that the ticket being modified belongs to the user making the request, allowing an attacker to close and/or add files and replies to tickets other than their own.
Attacker Value
Unknown

CVE-2023-28756

Disclosure Date: March 31, 2023 (last updated October 08, 2023)
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Attacker Value
Unknown

CVE-2023-28755

Disclosure Date: March 31, 2023 (last updated October 08, 2023)
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
Attacker Value
Unknown

CVE-2021-46023

Disclosure Date: February 14, 2023 (last updated October 08, 2023)
An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby before 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Attacker Value
Unknown

CVE-2023-22799

Disclosure Date: February 09, 2023 (last updated October 08, 2023)
A ReDoS based DoS vulnerability in the GlobalID <1.0.1 which could allow an attacker supplying a carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.