Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ruby vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2022-24803
Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions before 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an malicious user to execute arbitrary system commands on the host operating syste...
Asciidoctor-include-ext Project Asciidoctor-include-ext
10
CVSSv2
CVE-2022-24720
image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the malicious user to execute sh...
Image Processing Project Image Processing
Debian Debian Linux 11.0
10
CVSSv2
CVE-2013-2512
The ftpd gem 0.2.1 for Ruby allows remote malicious users to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
Ftpd Project Ftpd 0.2.1
10
CVSSv2
CVE-2020-35458
An issue exists in ClusterLabs Hawk 2.x up to and including 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote malicious users to execute code a...
Clusterlabs Hawk 2.2.0-12
Clusterlabs Hawk 2.3.0-12
10
CVSSv2
CVE-2019-10780
BibTeX-ruby prior to 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
Bibtex-ruby Project Bibtex-ruby
10
CVSSv2
CVE-2019-11027
Ruby OpenID (aka ruby-openid) up to and including 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the...
Openid Ruby-openid
10
CVSSv2
CVE-2018-3779
active-support ruby gem 5.2.0 could allow a remote malicious user to execute arbitrary code on the system, caused by containing a malicious backdoor. An attacker could exploit this vulnerability to execute arbitrary code on the system.
Activesupport Project Activesupport 5.2.0
10
CVSSv2
CVE-2015-7541
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem prior to 0.0.5 for Ruby allows context-dependent malicious users to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
Colorscore Project Colorscore
10
CVSSv2
CVE-2013-1948
converter.rb in the md2pdf gem 0.0.1 for Ruby allows context-dependent malicious users to execute arbitrary commands via shell metacharacters in a filename.
Rob Westgeest Md2pdf 0.0.1
10
CVSSv2
CVE-2013-0277
ActiveRecord in Ruby on Rails prior to 2.3.17 and 3.x prior to 3.1.0 allows remote malicious users to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
Rubyonrails Rails 3.0.7
Rubyonrails Rails 3.0.16
Rubyonrails Rails 3.0.9
Rubyonrails Rails 3.0.5
Rubyonrails Rails 3.0.2
Rubyonrails Rails 3.0.12
Rubyonrails Rails 3.0.13
Rubyonrails Rails 3.0.0
Rubyonrails Rails 3.0.4
Rubyonrails Rails 3.0.14
Rubyonrails Rails 3.0.1
Rubyonrails Rails 3.0.19
Rubyonrails Rails 3.0.8
Rubyonrails Rails 3.0.6
Rubyonrails Ruby On Rails 3.0.4
Rubyonrails Rails 3.0.3
Rubyonrails Rails 3.0.11
Rubyonrails Rails 3.0.20
Rubyonrails Rails 3.0.17
Rubyonrails Rails 3.0.18
Rubyonrails Rails 3.0.10
Rubyonrails Rails 2.3.14
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »