Ruby-lang

Ruby

92 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 39.22%
  • Veröffentlicht 13.08.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by...

Exploit
  • EPSS 75.85%
  • Veröffentlicht 13.08.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows con...

Exploit
  • EPSS 37.12%
  • Veröffentlicht 13.08.2008 01:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended ...

  • EPSS 11.27%
  • Veröffentlicht 09.07.2008 00:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (...

  • EPSS 2.31%
  • Veröffentlicht 24.06.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent at...

  • EPSS 2.56%
  • Veröffentlicht 24.06.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger mem...

  • EPSS 4.02%
  • Veröffentlicht 24.06.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related t...

  • EPSS 2.52%
  • Veröffentlicht 24.06.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service v...

  • EPSS 1.81%
  • Veröffentlicht 24.06.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or ...

  • EPSS 0.27%
  • Veröffentlicht 18.04.2008 22:05:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary ...