Логотип exploitDog
bind:CVE-2018-1000074
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1000074

Количество 10

Количество 10

ubuntu логотип

CVE-2018-1000074

почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2018-1000074

почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2018-1000074

почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-1000074

почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-qj2w-mw2r-pv39

больше 3 лет назад

RubyGems Deserialization of Untrusted Data vulnerability

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2019-04230

почти 8 лет назад

Уязвимость компонентов lib/rubygems/commands/owner_command.rb и test/rubygems/test_gem_commands_owner_command.rb системы управления пакетами RubyGems, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-2028

больше 6 лет назад

ELSA-2019-2028: ruby security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1771-1

больше 6 лет назад

Security update for ruby-bundled-gems-rpmhelper, ruby2.5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1804-1

больше 6 лет назад

Security update for ruby-bundled-gems-rpmhelper, ruby2.5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1570-1

больше 5 лет назад

Security update for ruby2.1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1000074

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
redhat логотип
CVE-2018-1000074

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-1000074

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-1000074

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: ...

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
github логотип
GHSA-qj2w-mw2r-pv39

RubyGems Deserialization of Untrusted Data vulnerability

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04230

Уязвимость компонентов lib/rubygems/commands/owner_command.rb и test/rubygems/test_gem_commands_owner_command.rb системы управления пакетами RubyGems, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
1%
Низкий
почти 8 лет назад
oracle-oval логотип
ELSA-2019-2028

ELSA-2019-2028: ruby security update (MODERATE)

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1771-1

Security update for ruby-bundled-gems-rpmhelper, ruby2.5

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1804-1

Security update for ruby-bundled-gems-rpmhelper, ruby2.5

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1570-1

Security update for ruby2.1

больше 5 лет назад

Уязвимостей на страницу