Show filters
104 Total Results
Displaying 51-60 of 104
Sort by:
Attacker Value
Unknown

CVE-2017-6181

Disclosure Date: April 03, 2017 (last updated November 26, 2024)
The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.
0
Attacker Value
Unknown

CVE-2009-5147

Disclosure Date: March 29, 2017 (last updated November 26, 2024)
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
0
Attacker Value
Unknown

CVE-2016-7798

Disclosure Date: January 30, 2017 (last updated November 25, 2024)
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
Attacker Value
Unknown

CVE-2016-2336

Disclosure Date: January 06, 2017 (last updated November 25, 2024)
Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.
0
Attacker Value
Unknown

CVE-2016-2337

Disclosure Date: January 06, 2017 (last updated November 25, 2024)
Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.
0
Attacker Value
Unknown

CVE-2016-2339

Disclosure Date: January 06, 2017 (last updated November 25, 2024)
An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
0
Attacker Value
Unknown

CVE-2015-7551

Disclosure Date: March 24, 2016 (last updated November 25, 2024)
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
0
Attacker Value
Unknown

CVE-2015-3900

Disclosure Date: June 24, 2015 (last updated October 05, 2023)
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
0
Attacker Value
Unknown

CVE-2014-8090

Disclosure Date: November 21, 2014 (last updated October 05, 2023)
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
0
Attacker Value
Unknown

CVE-2014-4975

Disclosure Date: November 15, 2014 (last updated October 05, 2023)
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
0