Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cgqc-fqxr-q6r6

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

EPSS

Процентиль: 91%
0.07274
Низкий

Дефекты

CWE-400

Связанные уязвимости

ubuntu
около 14 лет назад

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

redhat
около 14 лет назад

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

nvd
около 14 лет назад

JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

debian
около 14 лет назад

JRuby before 1.6.5.1 computes hash values without restricting the abil ...

EPSS

Процентиль: 91%
0.07274
Низкий

Дефекты

CWE-400