Количество 5
Количество 5

CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.

CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
CVE-2021-32823
In the bindata RubyGem before version 2.4.10 there is a potential deni ...
GHSA-hj56-84jw-67h6
Potential Denial-of-Service in bindata

BDU:2021-04897
Уязвимость декларативного способа чтения и записи бинарных форматов файлов BinData, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-32823 In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers. | CVSS3: 3.7 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-32823 In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers. | CVSS3: 3.7 | 0% Низкий | почти 4 года назад |
CVE-2021-32823 In the bindata RubyGem before version 2.4.10 there is a potential deni ... | CVSS3: 3.7 | 0% Низкий | почти 4 года назад | |
GHSA-hj56-84jw-67h6 Potential Denial-of-Service in bindata | CVSS3: 3.7 | 0% Низкий | почти 4 года назад | |
![]() | BDU:2021-04897 Уязвимость декларативного способа чтения и записи бинарных форматов файлов BinData, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 3.7 | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу