Описание
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.
Ссылки
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:ox_project:ox:2.8.1:*:*:*:*:ruby:*:*
EPSS
Процентиль: 38%
0.00165
Низкий
5.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 5.5
ubuntu
почти 8 лет назад
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.
CVSS3: 5.5
debian
почти 8 лет назад
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based b ...
EPSS
Процентиль: 38%
0.00165
Низкий
5.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-125