Show filters
348 Total Results
Displaying 71-80 of 348
Sort by:
Attacker Value
Unknown
CVE-2022-0614
Disclosure Date: February 16, 2022 (last updated February 23, 2025)
Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.
0
Attacker Value
Unknown
CVE-2022-0570
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
0
Attacker Value
Unknown
CVE-2022-23634
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.
0
Attacker Value
Unknown
CVE-2022-23633
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
0
Attacker Value
Unknown
CVE-2022-0525
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Out-of-bounds Read in Homebrew mruby prior to 3.2.
0
Attacker Value
Unknown
CVE-2021-41816
Disclosure Date: February 06, 2022 (last updated February 23, 2025)
CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.
0
Attacker Value
Unknown
CVE-2022-0481
Disclosure Date: February 04, 2022 (last updated February 23, 2025)
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
0
Attacker Value
Unknown
CVE-2022-0326
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
0
Attacker Value
Unknown
CVE-2022-0240
Disclosure Date: January 17, 2022 (last updated February 23, 2025)
mruby is vulnerable to NULL Pointer Dereference
0
Attacker Value
Unknown
CVE-2021-46020
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can lead to a segmentation fault or application crash.
0