
CVE-2006-3694
https://notcve.org/view.php?id=CVE-2006-3694
19 Jul 2006 — Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations". Múltiples vulnerabilidades no especificadas en Ruby anterior a 1.8.5 permite a atacantes remotos evitar la validación "nivel de seguro" a través de vectores no especificados afectando a la función (1)alias y (2) "operaciones de directorio". • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P •

CVE-2006-1931 – Yukihiro Matsumoto Ruby 1.x - XMLRPC Server Denial of Service
https://notcve.org/view.php?id=CVE-2006-1931
20 Apr 2006 — The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data. • https://www.exploit-db.com/exploits/27723 •

CVE-2005-2337
https://notcve.org/view.php?id=CVE-2005-2337
07 Oct 2005 — Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin). • http://jvn.jp/jp/JVN%2362914675/index.html •

CVE-2005-1992
https://notcve.org/view.php?id=CVE-2005-1992
20 Jun 2005 — The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands. • http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/5237 •

CVE-2004-0983
https://notcve.org/view.php?id=CVE-2004-0983
19 Nov 2004 — The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request. • http://www.debian.org/security/2004/dsa-586 •

CVE-2004-0755
https://notcve.org/view.php?id=CVE-2004-0755
19 Aug 2004 — The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions. La capacidad FileStore en CGI::Session de Ruby anteriores a 1.8.1, y posiblemente PStore, crea ficheros con permisos no seguros, lo que puede permitir a usuarios locales robar información de sesión secuestrar sesiones. • http://secunia.com/advisories/12290 •