ruby vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2026-27820

<3.4.9-r0
  • H
Improper Authentication

<2.6.5-r0
  • M
CVE-2019-15845

<2.6.5-r0
  • H
Arbitrary Code Injection

<3.1.3-r0
  • C
Double Free

<3.1.2-r0
  • H
Reliance on Cookies without Validation and Integrity Checking

<3.0.3-r0
  • C
Integer Overflow or Wraparound

<3.0.3-r0
  • H
Out-of-bounds Read

<3.1.2-r0
  • H
Improper Input Validation

<2.4.2-r0
  • H
Origin Validation Error

<2.4.2-r0
  • H
OS Command Injection

<2.4.3-r0
  • M
Information Exposure

<2.6.6-r0
  • M
Inefficient Regular Expression Complexity

<3.1.4-r0
  • L
CVE-2024-27280

<3.3.1-r0
  • M
Inefficient Regular Expression Complexity

<3.1.4-r0
  • L
CVE-2024-27281

<3.3.1-r0
  • H
Improper Input Validation

<2.6.6-r0
  • H
Arbitrary Command Injection

<2.7.4-r0
  • H
XML External Entity (XXE) Injection

<2.7.3-r0
  • H
Directory Traversal

<2.7.3-r0
  • H
Improper Input Validation

<2.4.2-r0
  • L
CVE-2024-27282

<3.3.1-r0
  • H
Improper Cross-boundary Removal of Sensitive Data

<3.4.7-r0
  • C
Use of Externally-Controlled Format String

<2.4.2-r0
  • H
CVE-2018-16396

<2.5.2-r0
  • H
Inadequate Encryption Strength

<2.7.4-r0
  • C
CVE-2018-16395

<2.5.2-r0
  • M
Exposure of Resource to Wrong Sphere

<2.7.4-r0
  • C
Directory Traversal

<2.5.1-r0
  • H
HTTP Request Smuggling

<2.7.2-r0
  • H
Inefficient Regular Expression Complexity

<3.0.3-r0
  • M
HTTP Response Splitting

<2.5.1-r0
  • H
Resource Exhaustion

<2.5.1-r0
  • H
Improper Input Validation

<2.5.1-r0
  • H
Arbitrary Code Injection

<2.6.5-r0
  • C
Out-of-Bounds

<2.4.2-r0
  • M
Arbitrary Code Injection

<2.6.5-r0
  • H
Use of Externally-Controlled Format String

<2.5.1-r0
  • H
Improper Authentication

<2.4.2-r0
  • H
Directory Traversal

<2.5.1-r0
  • C
Arbitrary Code Injection

<2.4.2-r0
  • H
Out-of-Bounds

<2.4.2-r0