Search CVE reports


Toggle filters

71 – 80 of 104 results


CVE-2012-4466

Medium priority

Some fixes available 7 of 8

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API...

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2012-4464

Medium priority

Some fixes available 2 of 3

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks...

3 affected packages

ruby1.9, ruby1.8, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.9
ruby1.8
ruby1.9.1
Show less packages

CVE-2012-2126

Medium priority

Some fixes available 2 of 22

RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.

3 affected packages

jruby, ruby1.9.1, rubygems

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
jruby Not affected Not affected Not affected
ruby1.9.1 Not in release Not in release Not in release Not in release
rubygems Not affected Not affected Not in release Not in release
Show less packages

CVE-2012-2125

Low priority

Some fixes available 2 of 20

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

3 affected packages

jruby, ruby1.9.1, rubygems

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
jruby Not affected Not affected Not affected
ruby1.9.1 Not in release Not in release Not in release Not in release
rubygems Not affected Not affected Not in release Not in release
Show less packages

CVE-2011-4815

Medium priority

Some fixes available 4 of 5

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted...

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2011-4121

High priority
Not affected

The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private RSA key generation. A remote attacker could use this flaw to bypass or corrupt...

1 affected package

ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.9.1
Show less packages

CVE-2011-3624

Low priority
Ignored

Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary...

1 affected package

ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.9.1 Not in release
Show less packages

CVE-2011-2705

Medium priority

Some fixes available 3 of 9

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the...

3 affected packages

ruby1.9, ruby1.8, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.9
ruby1.8
ruby1.9.1
Show less packages

CVE-2011-1005

Low priority

Some fixes available 4 of 12

The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2011-1004

Low priority

Some fixes available 3 of 14

The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages