Search Results (Refine Search)
- CPE Product Version: cpe:/a:ruby-lang:ruby:2.0.0:p594
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2015-1855 |
verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters. Published: November 29, 2019; 4:15:10 PM -0500 |
V3.1: 5.9 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2009-5147 |
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names. Published: March 29, 2017; 10:59:00 AM -0400 |
V3.0: 7.3 HIGH V2.0: 7.5 HIGH |
CVE-2014-8090 |
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080. Published: November 21, 2014; 10:59:04 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |