ruby-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
HTTP Request Smuggling

<0:2.0.0.648-36.amzn2.0.13
  • M
XML External Entity (XXE) Injection

<0:2.0.0.648-36.amzn2.0.12
  • M
Out-of-bounds Read

<0:2.0.0.648-36.amzn2.0.12
  • M
Arbitrary Code Injection

<0:2.0.0.648-36.amzn2.0.11
  • M
Cleartext Transmission of Sensitive Information

<0:2.0.0.648-36.amzn2.0.10
  • M
Information Exposure

<0:2.0.0.648-36.amzn2.0.9
  • H
HTTP Response Splitting

<0:2.0.0.648-36.amzn2.0.8
  • H
Resource Exhaustion

<0:2.0.0.648-36.amzn2.0.7
  • H
Arbitrary Code Injection

<0:2.0.0.648-36.amzn2.0.7
  • H
Reliance on Cookies without Validation and Integrity Checking

<0:2.0.0.648-36.amzn2.0.7
  • H
Null Byte Interaction Error (Poison Null Byte)

<0:2.0.0.648-36.amzn2.0.7
  • H
HTTP Response Splitting

<0:2.0.0.648-36.amzn2.0.7
  • M
Resource Exhaustion

<0:2.0.0.648-36.amzn2.0.6
  • M
Out-of-bounds Read

<0:2.0.0.648-36.amzn2.0.5
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.4
  • M
Arbitrary Command Injection

<0:2.0.0.648-36.amzn2.0.2
  • M
Out-of-bounds Read

<0:2.0.0.648-36.amzn2.0.3
  • M
HTTP Request Smuggling

<0:2.0.0.648-36.amzn2.0.2
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.2
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-36.amzn2.0.1
  • M
Use of Externally-Controlled Format String

<0:2.0.0.648-36.amzn2.0.1
  • M
Resource Exhaustion

<0:2.0.0.648-36.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-36.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-36.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.0.0.648-36.amzn2.0.1
  • M
CVE-2018-16396

<0:2.0.0.648-36.amzn2.0.1
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.1
  • M
Deserialization of Untrusted Data

<0:2.0.0.648-36.amzn2.0.1
  • M
Link Following

<0:2.0.0.648-36.amzn2.0.1
  • M
Improper Verification of Cryptographic Signature

<0:2.0.0.648-36.amzn2.0.1
  • M
HTTP Response Splitting

<0:2.0.0.648-36.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.0.648-36.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
CVE-2018-16395

<0:2.0.0.648-34.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.0.0.648-33.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-33.amzn2.0.1
  • M
Improper Input Validation

<0:2.0.0.648-33.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.0.648-33.amzn2.0.1
  • M
Deserialization of Untrusted Data

<0:2.0.0.648-33.amzn2.0.1
  • M
Improper Verification of Cryptographic Signature

<0:2.0.0.648-33.amzn2.0.1
  • M
Link Following

<0:2.0.0.648-33.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.0.0.648-33.amzn2.0.1