Page 3 of 13 results (0.001 seconds)

CVSS: 4.3EPSS: 1%CPEs: 23EXPL: 0

Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings." Vulnerabilidad no especificada en Rack::Auth::AbstractRequest en Rack v1.1.x anterior a v1.1.5, v1.2.x anterior a v1.2.7, v1.3.x anterior a v1.3.9, y v1.4.x anterior a v1.4.4, permite a atacantes remotos provocar una denegación de servicio a través de vectores desconocidos relacionados con "symbolized arbitrary strings." • http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html http://rhn.redhat.com/errata/RHSA-2013-0544.html http://rhn.redhat.com/errata/RHSA-2013-0548.html http://www.debian.org/security/2013/dsa-2783 https://bugzilla.redhat.com/show_bug.cgi?id=895384 https://access.redhat.com/security/cve/CVE-2013-0184 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.1EPSS: 8%CPEs: 28EXPL: 0

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time. Rack::Sesión::Cookie en rack v1.5.x antes de v1.5.2, v1.4.x antes de v1.4.5, v1.3.x antes de v1.3.10, v1.2.x antes de v1.2.8, antes de v1.1.x y v1.1.6 permite atacantes remotos para adivinar la cookie de sesión, los privilegios de ganancia, y ejecutar código arbitrario a través de un ataque de sincronización que implica una función de comparación HMAC que no se ejecuta en tiempo constante. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html http://rack.github.com http://rhn.redhat.com/errata/RHSA-2013-0686.html http://secunia.com/advisories/52033 http://secunia.com/advisories/52134 http://secunia.com/advisories/52774 http://www.debian.org/security/2013/dsa-2783 http://www.osvdb.org/89939 https://bugzilla.redhat.com/show_bug.cgi?id=909071 https://gist.github.com/codahale/f9f3781f7b54985bee94 https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 1

Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. Rack anterior a v1.1.3, v1.2.x anterior a v1.2.5, v1.3.6 y v1.3.x calcula los valores hash de los parámetros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una denegación de servicio (CPU consumo) mediante el envío de gran cantidad de parámetros a mano. • http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html http://www.debian.org/security/2013/dsa-2783 http://www.kb.cert.org/vuls/id/903934 http://www.nruns.com/_downloads/advisory28122011.pdf http://www.ocert.org/advisories/ocert-2011-003.html https://gist.github.com/52bbc6b9cc19ce330829 • CWE-310: Cryptographic Issues •