Ruby-lang

Ruby

92 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.9%
  • Published 20.12.2017 09:29:01
  • Last modified 20.04.2025 01:37:25

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-201...

Exploit
  • EPSS 89.02%
  • Published 15.12.2017 09:29:00
  • Last modified 20.04.2025 01:37:25

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command followi...

  • EPSS 2.14%
  • Published 19.09.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted...

  • EPSS 10.26%
  • Published 19.09.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.

Exploit
  • EPSS 0.85%
  • Published 15.09.2017 19:29:00
  • Last modified 20.04.2025 01:37:25

Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information discl...

  • EPSS 1.13%
  • Published 06.09.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.

Exploit
  • EPSS 1.99%
  • Published 31.08.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning...

  • EPSS 0.34%
  • Published 19.07.2017 21:29:00
  • Last modified 20.04.2025 01:37:25

The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in par...

Exploit
  • EPSS 1.59%
  • Published 12.06.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

Exploit
  • EPSS 0.54%
  • Published 24.05.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_...