Page 6 of 149 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

26 Nov 2019 — Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF. Ruby versiones hasta 2.4.7, versiones 2.5.x hasta 2.5... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') •

CVSS: 8.1EPSS: 1%CPEs: 7EXPL: 1

26 Nov 2019 — Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method. Ruby versiones hasta 2.4.7, versiones 2.5.x hasta 2.5.6 y versiones 2.6.x hasta 2.6.4, permite una inyección de código si el primer argumento (también conocido como el argumento "command") para Shell#[] o Shell#test en la biblioteca lib/shell.rb es u... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

18 Nov 2019 — Distributed Ruby (aka DRuby) 1.8 mishandles instance_eval. Distributed Ruby (también se conoce como DRuby) versión 1.8, maneja inapropiadamente a instance_eval. • https://github.com/tomquinn8/CVE-2011-5331 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

18 Nov 2019 — Distributed Ruby (aka DRuby) 1.8 mishandles the sending of syscalls. Distributed Ruby (también se conoce como DRuby) versión 1.8, maneja inapropiadamente el envío de syscalls. • https://www.exploit-db.com/exploits/17031 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

06 Nov 2019 — Rbot Reaction plugin allows command execution El plugin Rbot Reaction, permite una ejecución de comandos • https://security-tracker.debian.org/tracker/CVE-2010-2446 • CWE-20: Improper Input Validation •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

31 Oct 2019 — ruby193 uses an insecure LD_LIBRARY_PATH setting. ruby193 usa una configuración de LD_LIBRARY_PATH no segura. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1945 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

10 May 2019 — The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem. ** EN DISPUTA ** La WEBrick gem versión 1.4.2 para Ruby permite salto de directorio si el atacante alguna vez tuvo acceso local para crear un enlace simbólico a una ubicación fuera del directorio web root. NOTA:... • https://bugs.ruby-lang.org/issues/15835 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 9.8EPSS: 7%CPEs: 13EXPL: 0

03 Nov 2018 — An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to cre... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-295: Improper Certificate Validation •

CVSS: 8.1EPSS: 3%CPEs: 16EXPL: 0

03 Nov 2018 — An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats. Se ha descubierto un problema en Ruby, en versiones anteriores a la 2.3.8, versiones 2.4.x anteriores a la 2.4.5, versiones 2.5.x anteriores a la 2.5.2 y versiones 2.6.x anteriores a la 2.6.0-preview3. No contamina las cadenas que resultan de desempaquetar cadenas contaminadas con algunos formatos. It wa... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

05 Jul 2018 — ruby-grape ruby gem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter. La gema de ruby ruby-grape sufre de una vulnerabilidad de Cross-Site Scripting (XSS) mediante el parámetro "format". • https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •