Page 7 of 32 results (0.002 seconds)

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 1

Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution. Existe un tipo de confusión en el método de clase _cancel_eval Ruby's TclTkIp. El atacante que pasa un tipo diferente de objeto que una String como argumento "retval" puede provocar la ejecución de código arbitrario. • http://www.securityfocus.com/bid/91233 http://www.talosintelligence.com/reports/TALOS-2016-0031 https://lists.debian.org/debian-lts-announce/2018/08/msg00028.html https://security.gentoo.org/glsa/201710-18 •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 1

An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow. Existe una vulnerabilidad explotable de desbordamiento de memoria dinámica en la funcionalidad Fiddle::Function.new "initialize" de Ruby. En Fiddle::Function.new "initialize" la ubicación "arg_types" de la memoria dinámica del búfer se hace en base a la longitud de los args array. • http://www.securityfocus.com/bid/91234 http://www.talosintelligence.com/reports/TALOS-2016-0034 https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •