Ruby-lang

Ruby

92 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.39%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Co...

  • EPSS 0.7%
  • Veröffentlicht 03.04.2017 05:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular express...

  • EPSS 45.49%
  • Veröffentlicht 29.03.2017 14:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.

Exploit
  • EPSS 1.27%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.

Exploit
  • EPSS 0.68%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially construct...

Exploit
  • EPSS 0.81%
  • Veröffentlicht 06.01.2017 21:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.

  • EPSS 0.1%
  • Veröffentlicht 24.03.2016 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers ...

  • EPSS 2.4%
  • Veröffentlicht 24.06.2015 14:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, a...

Exploit
  • EPSS 10.49%
  • Veröffentlicht 21.11.2014 15:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string ...

  • EPSS 3.45%
  • Veröffentlicht 15.11.2014 20:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that tr...