Search for packages
| purl | pkg:maven/org.jruby/jruby@1.5.2 |
| Next non-vulnerable version | 9.0.0.0.rc1 |
| Latest non-vulnerable version | 10.0.0.1 |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5u1a-v9d1-rfac
Aliases: CVE-2013-2035 GHSA-49j7-qghp-5wj8 |
Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp. |
Affected by 1 other vulnerability. |
|
VCID-5xez-skrj-b3h4
Aliases: CVE-2013-1821 GHSA-hgg7-cghq-xhf4 OSV-90587 |
Entity expansion DoS vulnerability in REXML `lib/rexml/text.rb` in the REXML parser allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack. |
Affected by 2 other vulnerabilities. |
|
VCID-uudj-r63z-kban
Aliases: CVE-2013-1856 GHSA-9c2j-593q-3g82 OSV-91451 |
XML Parsing Vulnerability affecting JRuby users There is a vulnerability in the JDOM backend to ActiveSupport's XML parser. you should upgrade or use one of the work arounds immediately. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||