- EPSS 19.83%
- Published 09.04.2013 21:55:01
- Last modified 11.04.2025 00:51:21
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
CVE-2013-0256
- EPSS 3.58%
- Published 01.03.2013 05:40:17
- Last modified 11.04.2025 00:51:21
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
- EPSS 2.92%
- Published 28.11.2012 13:03:10
- Last modified 11.04.2025 00:51:21
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption)...
- EPSS 0.52%
- Published 24.11.2012 20:55:03
- Last modified 11.04.2025 00:51:21
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
- EPSS 0.37%
- Published 11.10.2012 10:51:57
- Last modified 11.04.2025 00:51:21
Untrusted search path vulnerability in the installation functionality in Ruby 1.9.3-p194, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Ruby193\bin directory, which may be a...
CVE-2011-4815
- EPSS 1.66%
- Published 30.12.2011 01:55:01
- Last modified 11.04.2025 00:51:21
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an applicatio...
- EPSS 0.5%
- Published 05.08.2011 22:55:01
- Last modified 11.04.2025 00:51:21
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a ...
- EPSS 0.8%
- Published 05.08.2011 21:55:04
- Last modified 11.04.2025 00:51:21
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a ...
- EPSS 0.99%
- Published 05.08.2011 21:55:04
- Last modified 11.04.2025 00:51:21
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leverag...
CVE-2011-0188
- EPSS 2.61%
- Published 23.03.2011 02:00:06
- Last modified 11.04.2025 00:51:21
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitr...