Security update for ruby with denial of service flaw resolutio
Reporter | Title | Published | Views | Family All 100 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 9 Dec 200800:30 | – | prion |
![]() | Design/Logic Flaw | 13 Aug 200801:41 | – | prion |
![]() | CentOS Update for irb CESA-2008:0981 centos4 x86_64 | 27 Feb 200900:00 | – | openvas |
![]() | RedHat Update for ruby RHSA-2008:0981-02 | 6 Mar 200900:00 | – | openvas |
![]() | CentOS Update for irb CESA-2008:0981 centos4 i386 | 27 Feb 200900:00 | – | openvas |
![]() | CentOS Update for irb CESA-2008:0981 centos4 x86_64 | 27 Feb 200900:00 | – | openvas |
![]() | RedHat Update for ruby RHSA-2008:0981-02 | 6 Mar 200900:00 | – | openvas |
![]() | CentOS Update for irb CESA-2008:0981 centos4 i386 | 27 Feb 200900:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2008-0981) | 8 Oct 201500:00 | – | openvas |
![]() | FreeBSD Ports: ruby, ruby+pthreads, ruby+pthreads+oniguruma, ruby+oniguruma | 4 Sep 200800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ia64 | ruby | 1.8.5-5.el5_2.6 | ruby-1.8.5-5.el5_2.6.ia64.rpm |
RedHat | 5 | ia64 | ruby-rdoc | 1.8.5-5.el5_2.6 | ruby-rdoc-1.8.5-5.el5_2.6.ia64.rpm |
RedHat | 5 | s390x | ruby-devel | 1.8.5-5.el5_2.6 | ruby-devel-1.8.5-5.el5_2.6.s390x.rpm |
RedHat | 4 | s390 | ruby-docs | 1.8.1-7.el4_7.2 | ruby-docs-1.8.1-7.el4_7.2.s390.rpm |
RedHat | 4 | s390x | ruby | 1.8.1-7.el4_7.2 | ruby-1.8.1-7.el4_7.2.s390x.rpm |
RedHat | 5 | i386 | ruby-mode | 1.8.5-5.el5_2.6 | ruby-mode-1.8.5-5.el5_2.6.i386.rpm |
RedHat | 4 | s390x | ruby-mode | 1.8.1-7.el4_7.2 | ruby-mode-1.8.1-7.el4_7.2.s390x.rpm |
RedHat | 5 | s390x | ruby-mode | 1.8.5-5.el5_2.6 | ruby-mode-1.8.5-5.el5_2.6.s390x.rpm |
RedHat | 5 | s390 | ruby-devel | 1.8.5-5.el5_2.6 | ruby-devel-1.8.5-5.el5_2.6.s390.rpm |
RedHat | 5 | x86_64 | ruby-libs | 1.8.5-5.el5_2.6 | ruby-libs-1.8.5-5.el5_2.6.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo