- EPSS 10.78%
- Published 03.11.2014 16:55:07
- Last modified 12.04.2025 10:46:40
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
CVE-2014-2734
- EPSS 5.8%
- Published 24.04.2014 23:55:05
- Last modified 12.04.2025 10:46:40
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after perfor...
CVE-2013-4164
- EPSS 16.45%
- Published 23.11.2013 19:55:03
- Last modified 11.04.2025 00:51:21
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute...
CVE-2013-2065
- EPSS 0.36%
- Published 02.11.2013 19:55:04
- Last modified 11.04.2025 00:51:21
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
CVE-2013-4363
- EPSS 0.66%
- Published 17.10.2013 23:55:04
- Last modified 11.04.2025 00:51:21
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows...
CVE-2013-4287
- EPSS 2.02%
- Published 17.10.2013 23:55:04
- Last modified 11.04.2025 00:51:21
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote at...
CVE-2013-4073
- EPSS 2.66%
- Published 18.08.2013 02:52:22
- Last modified 11.04.2025 00:51:21
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name fie...
CVE-2012-4481
- EPSS 0.49%
- Published 02.05.2013 14:55:05
- Last modified 11.04.2025 00:51:21
The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
- EPSS 1.52%
- Published 25.04.2013 23:55:01
- Last modified 11.04.2025 00:51:21
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the...
- EPSS 0.5%
- Published 25.04.2013 23:55:01
- Last modified 11.04.2025 00:51:21
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainte...