Show filters
31 Total Results
Displaying 1-10 of 31
Sort by:
Attacker Value
Unknown
CVE-2024-45409
Disclosure Date: September 10, 2024 (last updated September 21, 2024)
The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
0
Attacker Value
Unknown
CVE-2020-36401
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_free and obj_free).
0
Attacker Value
Unknown
CVE-2020-15866
Disclosure Date: July 21, 2020 (last updated February 21, 2025)
mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
0
Attacker Value
Unknown
CVE-2020-6838
Disclosure Date: January 11, 2020 (last updated February 21, 2025)
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.
0
Attacker Value
Unknown
CVE-2020-6840
Disclosure Date: January 11, 2020 (last updated February 21, 2025)
In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c.
0
Attacker Value
Unknown
CVE-2020-6839
Disclosure Date: January 11, 2020 (last updated February 21, 2025)
In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.
0
Attacker Value
Unknown
CVE-2017-0905
Disclosure Date: November 13, 2017 (last updated November 26, 2024)
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
0
Attacker Value
Unknown
CVE-2009-5147
Disclosure Date: March 29, 2017 (last updated November 26, 2024)
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
0
Attacker Value
Unknown
CVE-2015-7551
Disclosure Date: March 24, 2016 (last updated November 25, 2024)
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
0
Attacker Value
Unknown
CVE-2015-3900
Disclosure Date: June 24, 2015 (last updated October 05, 2023)
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
0