Ruby-lang

Ruby

92 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.9%
  • Veröffentlicht 20.12.2017 09:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-201...

Exploit
  • EPSS 89.02%
  • Veröffentlicht 15.12.2017 09:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command followi...

  • EPSS 2.14%
  • Veröffentlicht 19.09.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted...

  • EPSS 10.26%
  • Veröffentlicht 19.09.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.

Exploit
  • EPSS 0.85%
  • Veröffentlicht 15.09.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information discl...

  • EPSS 1.13%
  • Veröffentlicht 06.09.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.

Exploit
  • EPSS 1.99%
  • Veröffentlicht 31.08.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning...

  • EPSS 0.34%
  • Veröffentlicht 19.07.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in par...

Exploit
  • EPSS 1.59%
  • Veröffentlicht 12.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

Exploit
  • EPSS 0.54%
  • Veröffentlicht 24.05.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_...