Логотип exploitDog
bind:CVE-2008-2376
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-2376

Количество 6

Количество 6

ubuntu логотип

CVE-2008-2376

почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

CVSS2: 7.5
EPSS: Средний
redhat логотип

CVE-2008-2376

почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

EPSS: Средний
nvd логотип

CVE-2008-2376

почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

CVSS2: 7.5
EPSS: Средний
debian логотип

CVE-2008-2376

почти 17 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before ...

CVSS2: 7.5
EPSS: Средний
github логотип

GHSA-f7wf-fwmg-r7g3

около 3 лет назад

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

EPSS: Средний
oracle-oval логотип

ELSA-2008-0561

почти 17 лет назад

ELSA-2008-0561: ruby security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2008-2376

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

CVSS2: 7.5
14%
Средний
почти 17 лет назад
redhat логотип
CVE-2008-2376

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

14%
Средний
почти 17 лет назад
nvd логотип
CVE-2008-2376

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

CVSS2: 7.5
14%
Средний
почти 17 лет назад
debian логотип
CVE-2008-2376

Integer overflow in the rb_ary_fill function in array.c in Ruby before ...

CVSS2: 7.5
14%
Средний
почти 17 лет назад
github логотип
GHSA-f7wf-fwmg-r7g3

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

14%
Средний
около 3 лет назад
oracle-oval логотип
ELSA-2008-0561

ELSA-2008-0561: ruby security update (MODERATE)

почти 17 лет назад

Уязвимостей на страницу