Ruby-lang

Ruby

92 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.63%
  • Published 13.07.2021 13:15:09
  • Last modified 21.11.2024 06:06:16

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract inf...

  • EPSS 0.36%
  • Published 21.04.2021 07:15:07
  • Last modified 21.11.2024 06:00:27

The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.

  • EPSS 0.33%
  • Published 06.10.2020 13:15:13
  • Last modified 21.11.2024 05:18:14

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issu...

Exploit
  • EPSS 0.38%
  • Published 04.05.2020 15:15:13
  • Last modified 21.11.2024 04:56:23

An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied...

  • EPSS 1.47%
  • Published 28.02.2020 17:15:12
  • Last modified 21.11.2024 05:33:45

In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as ...

  • EPSS 2.72%
  • Published 29.11.2019 21:15:10
  • Last modified 21.11.2024 02:26:16

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multi...

Exploit
  • EPSS 1.27%
  • Published 26.11.2019 18:15:15
  • Last modified 21.11.2024 04:30:24

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary R...

  • EPSS 0.71%
  • Published 26.11.2019 18:15:15
  • Last modified 21.11.2024 04:30:23

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, ...

  • EPSS 0.61%
  • Published 26.11.2019 18:15:15
  • Last modified 21.11.2024 04:30:15

WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or ...

  • EPSS 0.32%
  • Published 26.11.2019 17:15:11
  • Last modified 21.11.2024 04:29:35

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.