9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.0%
A vulnerability in the high-level Ruby programming language is related to a type conversion bug in the
some conversion methods, such as Kernel#Float and String#to_f. Exploitation of the vulnerability could
allow an attacker acting remotely to pass specially crafted data to a vulnerable application,
cause memory corruption, and execute arbitrary code on the system
A vulnerability in the high-level Ruby programming language is related to a boundary error in the Regexp compilation process.
in the Regexp compilation process. Exploitation of the vulnerability could allow an attacker acting remotely to pass specially crafted data to an application, cause memory corruption, and execute arbitrary code on the system.
specially crafted data to an application, cause a memory release error, and execute arbitrary code
on the target system
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.0%