The extlib gem for Ruby 0.9.15 and earlier allows remote attackers to execute arbitrary code or cause denial of service via YAML or Symbol type conversio
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | libextlib-ruby - security update | 14 Mar 201500:00 | – | osv |
![]() | extlib does not properly restrict casts of string values | 24 Oct 201718:33 | – | osv |
![]() | extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution | 7 Jan 201320:00 | – | rubygems |
![]() | Debian: Security Advisory (DLA-172-1) | 8 Mar 202300:00 | – | openvas |
![]() | CVE-2013-1802 | 9 Apr 201320:55 | – | nvd |
![]() | Type confusion | 9 Apr 201320:55 | – | prion |
![]() | CVE-2013-1802 | 9 Apr 201320:55 | – | cve |
![]() | extlib does not properly restrict casts of string values | 24 Oct 201718:33 | – | github |
![]() | CVE-2013-1802 | 9 Apr 201320:00 | – | cvelist |
![]() | CVE-2013-1802 | 9 Apr 201320:55 | – | debiancve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo