The crack gem for Ruby 0.3.1 and earlier allows remote code execution and denial of service via YAML and Symbol type conversio
Reporter | Title | Published | Views | Family All 178 |
---|---|---|---|---|
![]() | Type confusion | 9 Apr 201320:55 | – | prion |
![]() | Type confusion | 13 Jan 201322:55 | – | prion |
![]() | Type confusion | 9 Apr 201320:55 | – | prion |
![]() | Sql injection | 30 Jan 201312:00 | – | prion |
![]() | Type confusion | 9 Apr 201320:55 | – | prion |
![]() | Design/Logic Flaw | 9 Apr 201320:55 | – | prion |
![]() | Type confusion | 25 Apr 201323:55 | – | prion |
![]() | crack does not properly restrict casts of string values | 24 Oct 201718:33 | – | osv |
![]() | actionpack Improper Input Validation vulnerability | 24 Oct 201718:33 | – | osv |
![]() | OPENSUSE-SU-2024:10188-1 ruby2.2-rubygem-extlib-0.9.16-7.4 on GA media | 15 Jun 202400:00 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo