Max CVSS | 7.5 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2016-7798 | 5.0 |
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
|
05-11-2020 - 14:56 | 30-01-2017 - 22:59 | |
CVE-2017-0901 | 6.4 |
RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
|
09-10-2019 - 23:21 | 31-08-2017 - 20:29 | |
CVE-2017-0902 | 6.8 |
RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
|
09-10-2019 - 23:21 | 31-08-2017 - 20:29 | |
CVE-2017-0899 | 7.5 |
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
|
09-10-2019 - 23:21 | 31-08-2017 - 20:29 | |
CVE-2017-14064 | 7.5 |
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning
|
13-05-2019 - 18:48 | 31-08-2017 - 17:29 | |
CVE-2017-0900 | 5.0 |
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
|
13-05-2019 - 14:31 | 31-08-2017 - 20:29 | |
CVE-2015-9096 | 4.3 |
Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
|
15-07-2018 - 01:29 | 12-06-2017 - 20:29 |