Vulnerabilities > Ruby Lang > Ruby > Medium

DATE CVE VULNERABILITY TITLE RISK
2011-08-05 CVE-2011-2705 Improper Input Validation vulnerability in Ruby-Lang Ruby
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
network
low complexity
ruby-lang CWE-20
5.0
2011-03-23 CVE-2011-0188 Numeric Errors vulnerability in Ruby-Lang Ruby
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue." Per: http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html 'This issue only affects 64-bit Ruby processes'.
6.8
2011-03-02 CVE-2011-1005 Permissions, Privileges, and Access Controls vulnerability in Ruby-Lang Ruby
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
network
low complexity
ruby-lang CWE-264
5.0
2011-03-02 CVE-2011-1004 Link Following vulnerability in Ruby-Lang Ruby
The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
6.3
2009-06-11 CVE-2009-1904 Numeric Errors vulnerability in Ruby-Lang Ruby 1.8.6/1.8.7
The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
network
low complexity
ruby-lang CWE-189
5.0
2009-02-20 CVE-2009-0642 Improper Authentication vulnerability in Ruby-Lang Ruby 1.8/1.9
ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
network
ruby-lang CWE-287
6.8
2008-09-04 CVE-2008-3905 Improper Authentication vulnerability in Ruby-Lang Ruby
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
network
ruby-lang CWE-287
5.8
2008-08-27 CVE-2008-3790 Improper Input Validation vulnerability in Ruby-Lang Ruby 1.8.6/1.8.7/1.9
The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
network
low complexity
ruby-lang CWE-20
5.0
2008-08-14 CVE-2008-3443 Resource Management Errors vulnerability in Ruby-Lang Ruby
The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
network
low complexity
ruby-lang CWE-399
5.0
2008-04-18 CVE-2008-1891 Path Traversal vulnerability in Ruby-Lang Ruby
Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) .
network
low complexity
ruby-lang CWE-22
5.0