Количество 31
Количество 31
ELSA-2025-8131
ELSA-2025-8131: ruby security update (MODERATE)
ELSA-2025-4493
ELSA-2025-4493: ruby:3.3 security update (MODERATE)
ELSA-2025-10217
ELSA-2025-10217: ruby:3.3 security update (MODERATE)
ELSA-2025-4488
ELSA-2025-4488: ruby:3.1 security update (MODERATE)
ELSA-2025-4063
ELSA-2025-4063: ruby:3.1 security update (MODERATE)

CVE-2025-27221
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.

CVE-2025-27221
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.

CVE-2025-27221
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.

CVE-2025-27221
CVE-2025-27221
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.jo ...

ROS-20250417-13
Уязвимость ruby
GHSA-22h5-pq3x-2gf2
URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+

BDU:2025-05129
Уязвимость программного средства URI gem, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации

SUSE-SU-2025:02739-2
Security update for ruby2.5

SUSE-SU-2025:02739-1
Security update for ruby2.5

CVE-2025-25186
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

CVE-2025-25186
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

CVE-2025-25186
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.

CVE-2025-25186
CVE-2025-25186
Net::IMAP implements Internet Message Access Protocol (IMAP) client fu ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2025-8131 ELSA-2025-8131: ruby security update (MODERATE) | 3 месяца назад | |||
ELSA-2025-4493 ELSA-2025-4493: ruby:3.3 security update (MODERATE) | 5 месяцев назад | |||
ELSA-2025-10217 ELSA-2025-10217: ruby:3.3 security update (MODERATE) | 3 месяца назад | |||
ELSA-2025-4488 ELSA-2025-4488: ruby:3.1 security update (MODERATE) | 5 месяцев назад | |||
ELSA-2025-4063 ELSA-2025-4063: ruby:3.1 security update (MODERATE) | 5 месяцев назад | |||
![]() | CVE-2025-27221 In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host. | CVSS3: 3.2 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2025-27221 In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host. | CVSS3: 3.2 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2025-27221 In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host. | CVSS3: 3.2 | 0% Низкий | 7 месяцев назад |
![]() | CVSS3: 5.3 | 0% Низкий | 7 месяцев назад | |
CVE-2025-27221 In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.jo ... | CVSS3: 3.2 | 0% Низкий | 7 месяцев назад | |
![]() | ROS-20250417-13 Уязвимость ruby | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад |
GHSA-22h5-pq3x-2gf2 URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ | CVSS3: 3.2 | 0% Низкий | 7 месяцев назад | |
![]() | BDU:2025-05129 Уязвимость программного средства URI gem, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 5.3 | 0% Низкий | 7 месяцев назад |
![]() | SUSE-SU-2025:02739-2 Security update for ruby2.5 | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02739-1 Security update for ruby2.5 | около 2 месяцев назад | ||
![]() | CVE-2025-25186 Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory. | CVSS3: 6.5 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2025-25186 Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory. | CVSS3: 6.5 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2025-25186 Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory. | CVSS3: 6.5 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 6.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-25186 Net::IMAP implements Internet Message Access Protocol (IMAP) client fu ... | CVSS3: 6.5 | 0% Низкий | 8 месяцев назад |
Уязвимостей на страницу