Search Results (Refine Search)
- Keyword (text search): Ruby
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2017-16229 |
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse. Published: February 26, 2018; 5:29:00 PM -0500 |
V3.0: 5.5 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2015-4412 |
BSON injection vulnerability in the legal? function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string. Published: February 05, 2018; 11:29:00 AM -0500 |
V3.0: 9.8 CRITICAL V2.0: 7.5 HIGH |
CVE-2014-1835 |
The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to steal the login credentials by watching the process table. Published: February 02, 2018; 4:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-1834 |
The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to inject arbitrary code by adding a semi-colon in their username or password. Published: February 02, 2018; 4:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2014-5004 |
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-5003 |
chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2014-5002 |
The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-5001 |
lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-5000 |
The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-4999 |
vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-4998 |
test/tc_database.rb in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-4997 |
lib/commands/setup.rb in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-4996 |
lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to write to arbitrary files via a symlink attack on /tmp/my.cnf.#{target_host}. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2014-4995 |
Race condition in lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.0 HIGH V2.0: 1.9 LOW |
CVE-2014-4994 |
lib/gyazo/client.rb in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2014-4993 |
(1) lib/backup/cli/utility.rb in the backup-agoddard gem 3.0.28 and (2) lib/backup/cli/utility.rb in the backup_checksum gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-4992 |
lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2014-4991 |
(1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process. Published: January 10, 2018; 1:29:00 PM -0500 |
V3.0: 7.8 HIGH V2.0: 2.1 LOW |
CVE-2017-17920 |
SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input Published: December 29, 2017; 11:29:00 AM -0500 |
V3.0: 8.1 HIGH V2.0: 6.8 MEDIUM |
CVE-2017-17919 |
SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input Published: December 29, 2017; 11:29:00 AM -0500 |
V3.0: 8.1 HIGH V2.0: 6.8 MEDIUM |