Lucene search

K
Ruby-langRuby2.3.0

8 matches found

CVE
CVE
added 2022/09/29 3:15 a.m.263 views

CVE-2016-2338

An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array s...

9.8CVSS9.5AI score0.11844EPSS
CVE
CVE
added 2017/09/19 5:29 p.m.249 views

CVE-2017-10784

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.

9.3CVSS7.9AI score0.02063EPSS
CVE
CVE
added 2017/09/19 5:29 p.m.223 views

CVE-2017-14033

The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.

7.5CVSS6.6AI score0.09915EPSS
CVE
CVE
added 2017/08/31 5:29 p.m.183 views

CVE-2017-14064

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is n...

9.8CVSS7.3AI score0.01568EPSS
CVE
CVE
added 2017/09/15 7:29 p.m.154 views

CVE-2017-0898

Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.

9.1CVSS7.4AI score0.0071EPSS
CVE
CVE
added 2017/01/06 9:59 p.m.121 views

CVE-2016-2339

An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can inc...

9.8CVSS7.5AI score0.00703EPSS
CVE
CVE
added 2017/01/06 9:59 p.m.115 views

CVE-2016-2337

Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.

9.8CVSS8.7AI score0.00983EPSS
CVE
CVE
added 2017/01/06 9:59 p.m.43 views

CVE-2016-2336

Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.

9.8CVSS9.6AI score0.01459EPSS