Ruby-Lang Ruby vulnerabilities
94 known vulnerabilities affecting ruby-lang/ruby.
Total CVEs
94
CISA KEV
0
Public exploits
9
Exploited in wild
0
Severity breakdown
CRITICAL16HIGH34MEDIUM44
Vulnerabilities
Page 3 of 5
CVE-2015-9096MEDIUMCVSS 6.1≤ 2.4.02017-06-12
CVE-2015-9096 [MEDIUM] CWE-93 CVE-2015-9096: Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT
Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
nvd
CVE-2017-9225CRITICALCVSS 9.8≤ 2.4.12017-05-24
CVE-2017-9225 [CRITICAL] CWE-787 CVE-2017-9225: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstr
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression c
nvd
CVE-2017-9229HIGHCVSS 7.5≤ 2.4.12017-05-24
CVE-2017-9229 [HIGH] CWE-476 CVE-2017-9229: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstr
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service
nvd
CVE-2017-6181HIGHCVSS 7.5v2.4.02017-04-03
CVE-2017-6181 [HIGH] CWE-20 CVE-2017-6181: The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression lib
The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.
nvd
CVE-2009-5147HIGHCVSS 7.3v1.8.0v1.9.0+11 more2017-03-29
CVE-2009-5147 [HIGH] CWE-20 CVE-2009-5147: DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
nvd
CVE-2016-2337CRITICALCVSS 9.8v2.2.2v2.3.02017-01-06
CVE-2016-2337 [CRITICAL] CVE-2016-2337: Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type o
Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.
nvd
CVE-2016-2336CRITICALCVSS 9.8v2.2.2v2.3.02017-01-06
CVE-2016-2336 [CRITICAL] CVE-2016-2336: Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. A
Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.
nvd
CVE-2016-2339CRITICALCVSS 9.8v2.2.2v2.3.02017-01-06
CVE-2016-2339 [CRITICAL] CWE-119 CVE-2016-2339: An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function
An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and
nvd
CVE-2015-7551HIGHCVSS 8.4≤ 2.0.0-p647v2.1.0+11 more2016-03-24
CVE-2015-7551 [HIGH] CVE-2015-7551: The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the D
nvd
CVE-2015-3900MEDIUMCVSS 5.0v1.9v1.9.1+10 more2015-06-24
CVE-2015-3900 [MEDIUM] CWE-254 CVE-2015-3900: RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostn
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
nvd
CVE-2014-8090MEDIUMCVSS 5.0≤ 1.9.3v1.9.3+5 more2014-11-21
CVE-2014-8090 [MEDIUM] CVE-2014-8090: The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) atta
nvd
CVE-2014-4975MEDIUMCVSS 5.0≤ 1.9.3v2.0+4 more2014-11-15
CVE-2014-4975 [MEDIUM] CWE-119 CVE-2014-4975: Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2,
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
nvd
CVE-2014-8080MEDIUMCVSS 5.0≤ 1.9.3v1.9.3+4 more2014-11-03
CVE-2014-8080 [MEDIUM] CVE-2014-8080: The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 al
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
nvd
CVE-2014-2734MEDIUMCVSS 5.8v2.0v2.0.0+2 more2014-04-24
CVE-2014-2734 [MEDIUM] CWE-399 CVE-2014-2734: The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a fil
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSS
nvd
CVE-2013-4164MEDIUMCVSS 6.8v1.8v1.9+5 more2013-11-23
CVE-2013-4164 [MEDIUM] CWE-119 CVE-2013-4164: Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the
nvd
CVE-2013-2065MEDIUMCVSS 6.4v1.9v1.9.1+4 more2013-11-02
CVE-2013-2065 [MEDIUM] CWE-264 CVE-2013-2065: (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195,
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
nvd
CVE-2013-4363MEDIUMCVSS 4.3v1.9v1.9.1+4 more2013-10-17
CVE-2013-4363 [MEDIUM] CVE-2013-4363: Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/versi
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a larg
nvd
CVE-2013-4287MEDIUMCVSS 4.3v1.9v1.9.1+4 more2013-10-17
CVE-2013-4287 [MEDIUM] CWE-310 CVE-2013-4287: Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large a
nvd
CVE-2013-4073MEDIUMCVSS 6.8v1.8.6-26v1.8.7+2 more2013-08-18
CVE-2013-4073 [MEDIUM] CVE-2013-4073: The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a craft
nvd
CVE-2012-4481MEDIUMCVSS 4.3v1.8.72013-05-02
CVE-2012-4481 [MEDIUM] CVE-2012-4481: The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the Na
The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
nvd