Ruby-lang

Ruby

92 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 19.83%
  • Veröffentlicht 09.04.2013 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.

  • EPSS 3.58%
  • Veröffentlicht 01.03.2013 05:40:17
  • Zuletzt bearbeitet 11.04.2025 00:51:21

darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.

  • EPSS 2.92%
  • Veröffentlicht 28.11.2012 13:03:10
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption)...

  • EPSS 0.52%
  • Veröffentlicht 24.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 11.10.2012 10:51:57
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Untrusted search path vulnerability in the installation functionality in Ruby 1.9.3-p194, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Ruby193\bin directory, which may be a...

  • EPSS 1.66%
  • Veröffentlicht 30.12.2011 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an applicatio...

  • EPSS 0.5%
  • Veröffentlicht 05.08.2011 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a ...

  • EPSS 0.8%
  • Veröffentlicht 05.08.2011 21:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a ...

  • EPSS 0.99%
  • Veröffentlicht 05.08.2011 21:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leverag...

  • EPSS 2.61%
  • Veröffentlicht 23.03.2011 02:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitr...