Lucene search

K

4 matches found

CVE
CVE
added 2023/08/17 6:15 p.m.2470 views

CVE-2023-40165

rubygems.org is the Ruby community's primary gem (library) hosting service. Insufficient input validation allowed malicious actors to replace any uploaded gem version that had a platform, version number, or gem name matching /-\d/, permanently replacing the legitimate upload in the canonical gem st...

7.5CVSS7.3AI score0.00143EPSS
CVE
CVE
added 2022/09/07 8:15 p.m.255 views

CVE-2022-36073

RubyGems.org is the Ruby community gem host. A bug in password & email change confirmation code allowed an attacker to change their RubyGems.org account's email to an unowned email address. Having access to an account whose email has been changed could enable an attacker to save API keys for that a...

8.8CVSS8.7AI score0.00156EPSS
CVE
CVE
added 2024/05/29 9:15 p.m.60 views

CVE-2024-35221

Rubygems.org is the Ruby community's gem hosting service. A Gem publisher can cause a Remote DoS when publishing a Gem. This is due to how Ruby reads the Manifest of Gem files when using Gem::Specification.from_yaml. from_yaml makes use of SafeYAML.load which allows YAML aliases inside the YAML-bas...

4.3CVSS4.5AI score0.00061EPSS
CVE
CVE
added 2024/01/12 9:15 p.m.42 views

CVE-2024-21654

Rubygems.org is the Ruby community's gem hosting service. Rubygems.org users with MFA enabled would normally be protected from account takeover in the case of email account takeover. However, a workaround on the forgotten password form allows an attacker to bypass the MFA requirement and takeover t...

9.8CVSS9.4AI score0.00163EPSS