Vulnerabilities > Ruby Lang > Ruby > High

DATE CVE VULNERABILITY TITLE RISK
2017-01-06 CVE-2016-2336 Type Confusion Multiple Remote Code Execution vulnerability in Ruby 2.2.2/2.3.0
Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface.
network
low complexity
ruby-lang
7.5
2013-08-29 CVE-2013-5647 Code Injection vulnerability in Adam Zaninovich Sounder 1.0.1
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
network
low complexity
adam-zaninovich ruby-lang CWE-94
7.5
2013-03-20 CVE-2013-1655 Improper Input Validation vulnerability in multiple products
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes." Per http://www.ubuntu.com/usn/usn-1759-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 "
network
low complexity
puppet puppetlabs ruby-lang CWE-20
7.5
2011-12-30 CVE-2011-4815 Improper Input Validation vulnerability in Ruby-Lang Ruby
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
network
low complexity
ruby-lang CWE-20
7.8
2010-07-12 CVE-2010-2489 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ruby-Lang Ruby
Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might allow local users to gain privileges via a crafted ARGF.inplace_mode value that is not properly handled when constructing the filenames of the backup files.
local
low complexity
ruby-lang microsoft CWE-119
7.2
2008-08-13 CVE-2008-3657 Improper Input Validation vulnerability in Ruby-Lang Ruby
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
network
low complexity
ruby-lang CWE-20
7.5
2008-08-13 CVE-2008-3656 Resource Management Errors vulnerability in Ruby-Lang Ruby
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
network
low complexity
ruby-lang CWE-399
7.8
2008-08-13 CVE-2008-3655 Permissions, Privileges, and Access Controls vulnerability in Ruby-Lang Ruby
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
network
low complexity
ruby-lang CWE-264
7.5
2008-06-24 CVE-2008-2726 Numeric Errors vulnerability in multiple products
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.
network
low complexity
ruby-lang debian canonical CWE-189
7.8
2008-06-24 CVE-2008-2725 Numeric Errors vulnerability in multiple products
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.
network
low complexity
ruby-lang debian canonical CWE-189
7.8