Количество 32
Количество 32
openSUSE-SU-2021:3838-1
Security update for ruby2.5
openSUSE-SU-2021:1535-1
Security update for ruby2.5
SUSE-SU-2021:3838-1
Security update for ruby2.5
RLSA-2022:0672
Moderate: ruby:2.5 security update
ELSA-2022-0672
ELSA-2022-0672: ruby:2.5 security update (MODERATE)
ELSA-2022-0672-1
ELSA-2022-0672-1: ruby:2.5 security update (MODERATE)
SUSE-SU-2021:3837-1
Security update for ruby2.1
RLSA-2021:3020
Important: ruby:2.7 security update
ELSA-2021-3020
ELSA-2021-3020: ruby:2.7 security update (IMPORTANT)
SUSE-SU-2022:1512-1
Security update for ruby2.5
RLSA-2022:0543
Important: ruby:2.6 security update
ELSA-2022-0543
ELSA-2022-0543: ruby:2.6 security update (IMPORTANT)
CVE-2021-31799
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
CVE-2021-31799
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
CVE-2021-31799
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
CVE-2021-31799
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby throug ...
ROS-20240723-03
Множественные уязвимости ruby
GHSA-ggxm-pgc9-g7fp
Arbitrary Code Execution in Rdoc
BDU:2021-05398
Уязвимость встроенного генератора документации RDoc для языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды
CVE-2021-31810
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
openSUSE-SU-2021:3838-1 Security update for ruby2.5 | почти 4 года назад | |||
openSUSE-SU-2021:1535-1 Security update for ruby2.5 | почти 4 года назад | |||
SUSE-SU-2021:3838-1 Security update for ruby2.5 | почти 4 года назад | |||
RLSA-2022:0672 Moderate: ruby:2.5 security update | почти 4 года назад | |||
ELSA-2022-0672 ELSA-2022-0672: ruby:2.5 security update (MODERATE) | почти 4 года назад | |||
ELSA-2022-0672-1 ELSA-2022-0672-1: ruby:2.5 security update (MODERATE) | больше 3 лет назад | |||
SUSE-SU-2021:3837-1 Security update for ruby2.1 | почти 4 года назад | |||
RLSA-2021:3020 Important: ruby:2.7 security update | больше 4 лет назад | |||
ELSA-2021-3020 ELSA-2021-3020: ruby:2.7 security update (IMPORTANT) | больше 4 лет назад | |||
SUSE-SU-2022:1512-1 Security update for ruby2.5 | больше 3 лет назад | |||
RLSA-2022:0543 Important: ruby:2.6 security update | почти 4 года назад | |||
ELSA-2022-0543 ELSA-2022-0543: ruby:2.6 security update (IMPORTANT) | почти 4 года назад | |||
CVE-2021-31799 In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | CVSS3: 7 | 0% Низкий | больше 4 лет назад | |
CVE-2021-31799 In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | CVSS3: 7 | 0% Низкий | больше 4 лет назад | |
CVE-2021-31799 In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | CVSS3: 7 | 0% Низкий | больше 4 лет назад | |
CVE-2021-31799 In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby throug ... | CVSS3: 7 | 0% Низкий | больше 4 лет назад | |
ROS-20240723-03 Множественные уязвимости ruby | CVSS3: 6.5 | больше 1 года назад | ||
GHSA-ggxm-pgc9-g7fp Arbitrary Code Execution in Rdoc | CVSS3: 7 | 0% Низкий | около 4 лет назад | |
BDU:2021-05398 Уязвимость встроенного генератора документации RDoc для языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды | CVSS3: 7 | 0% Низкий | больше 4 лет назад | |
CVE-2021-31810 An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions). | CVSS3: 5.8 | 1% Низкий | больше 4 лет назад |
Уязвимостей на страницу