Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
yukihiro matsumoto ruby 1.8.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6303
The read_multipart function in cgi.rb in Ruby prior to 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote malicious users to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
Yukihiro Matsumoto Ruby 1.8.4
Yukihiro Matsumoto Ruby 1.8.3
Yukihiro Matsumoto Ruby 1.8.1
Yukihiro Matsumoto Ruby 1.8.5
Yukihiro Matsumoto Ruby 1.8.2
Yukihiro Matsumoto Ruby 1.8.2 Pre2
Yukihiro Matsumoto Ruby 1.8
Yukihiro Matsumoto Ruby 1.8.2 Pre1
NA
CVE-2006-5467
The cgi.rb CGI library for Ruby 1.8 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via an HTTP request with a multipart MIME body that contains an invalid boundary specifier, as demonstrated using a specifier that begins with a &quo...
Yukihiro Matsumoto Ruby 1.8
NA
CVE-2006-3694
Multiple unspecified vulnerabilities in Ruby prior to 1.8.5 allow remote malicious users to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".
Yukihiro Matsumoto Ruby 1.8.4
Yukihiro Matsumoto Ruby 1.8.3
Yukihiro Matsumoto Ruby 1.8.2
NA
CVE-2006-1931
The HTTP/XMLRPC server in Ruby prior to 1.8.2 uses blocking sockets, which allows malicious users to cause a denial of service (blocked connections) via a large amount of data.
Yukihiro Matsumoto Ruby 1.6.5
Yukihiro Matsumoto Ruby 1.6.4
Yukihiro Matsumoto Ruby 1.8.1
Yukihiro Matsumoto Ruby 1.6.2
Yukihiro Matsumoto Ruby 1.6.3
Yukihiro Matsumoto Ruby 1.6.6
Yukihiro Matsumoto Ruby 1.6.7
Yukihiro Matsumoto Ruby 1.6
Yukihiro Matsumoto Ruby 1.8
Yukihiro Matsumoto Ruby 1.6.1
1 EDB exploit
NA
CVE-2005-2337
Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows malicious users to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
Yukihiro Matsumoto Ruby 1.6.5
Yukihiro Matsumoto Ruby 1.6.4
Yukihiro Matsumoto Ruby 1.8.1
Yukihiro Matsumoto Ruby 1.6.2
Yukihiro Matsumoto Ruby 1.6.3
Yukihiro Matsumoto Ruby 1.8.2 Pre2
Yukihiro Matsumoto Ruby 1.6.6
Yukihiro Matsumoto Ruby 1.6.7
Yukihiro Matsumoto Ruby 1.6
Yukihiro Matsumoto Ruby 1.8
Yukihiro Matsumoto Ruby 1.6.1
Yukihiro Matsumoto Ruby 1.8.2 Pre1
NA
CVE-2005-1992
The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote malicious users to execute arbitrary commands.
Yukihiro Matsumoto Ruby 1.8
NA
CVE-2004-0983
The CGI module in Ruby 1.6 prior to 1.6.8, and 1.8 prior to 1.8.2, allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
Yukihiro Matsumoto Ruby 1.8.1
Yukihiro Matsumoto Ruby 1.8.2 Pre2
Yukihiro Matsumoto Ruby 1.6.7
Yukihiro Matsumoto Ruby 1.6
Yukihiro Matsumoto Ruby 1.8
Yukihiro Matsumoto Ruby 1.8.2 Pre1
Mandrakesoft Mandrake Linux Corporate Server 2.1
Ubuntu Ubuntu Linux 4.1
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux 10.1
Mandrakesoft Mandrake Linux 10.0
Gentoo Linux
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started