Search for packages
purl | pkg:deb/ubuntu/ruby2.7@2.7.0-1ubuntu2 |
Next non-vulnerable version | 2.7.0-5ubuntu1.5 |
Latest non-vulnerable version | 2.7.0-5ubuntu1.5 |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-4qeb-7mva-aaak
Aliases: CVE-2021-32066 |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." |
Affected by 0 other vulnerabilities. |
VCID-gmf4-gcd5-aaab
Aliases: CVE-2021-31799 GHSA-ggxm-pgc9-g7fp |
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. |
Affected by 0 other vulnerabilities. |
VCID-nw56-rqyq-aaaq
Aliases: CVE-2021-28965 GHSA-8cr8-4vfw-mr7h |
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing. |
Affected by 3 other vulnerabilities. |
VCID-rzw4-4w1h-aaaj
Aliases: CVE-2020-10933 |
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter. |
Affected by 4 other vulnerabilities. |
VCID-sth6-4edt-aaar
Aliases: CVE-2020-25613 GHSA-gwfg-cqmg-cf8f |
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack. |
Affected by 4 other vulnerabilities. |
VCID-t5p8-75v9-aaap
Aliases: CVE-2020-10663 GHSA-jphg-qwrw-7w9g |
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent. |
Affected by 6 other vulnerabilities. |
VCID-xv5b-y3av-aaae
Aliases: CVE-2021-31810 |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions). |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|