ruby-tcltk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby-tcltk package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure

<0:2.0.0.648-36.amzn2.0.9
  • H
HTTP Response Splitting

<0:2.0.0.648-36.amzn2.0.8
  • H
Arbitrary Code Injection

<0:2.0.0.648-36.amzn2.0.7
  • H
Resource Exhaustion

<0:2.0.0.648-36.amzn2.0.7
  • H
Reliance on Cookies without Validation and Integrity Checking

<0:2.0.0.648-36.amzn2.0.7
  • H
HTTP Response Splitting

<0:2.0.0.648-36.amzn2.0.7
  • H
Null Byte Interaction Error (Poison Null Byte)

<0:2.0.0.648-36.amzn2.0.7
  • M
Resource Exhaustion

<0:2.0.0.648-36.amzn2.0.6
  • M
Out-of-bounds Read

<0:2.0.0.648-36.amzn2.0.5
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.4
  • M
Arbitrary Command Injection

<0:2.0.0.648-36.amzn2.0.2
  • M
Out-of-bounds Read

<0:2.0.0.648-36.amzn2.0.3
  • M
HTTP Request Smuggling

<0:2.0.0.648-36.amzn2.0.2
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.2
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-36.amzn2.0.1
  • M
Use of Externally-Controlled Format String

<0:2.0.0.648-36.amzn2.0.1
  • M
Resource Exhaustion

<0:2.0.0.648-36.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-36.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-36.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.0.0.648-36.amzn2.0.1
  • M
CVE-2018-16396

<0:2.0.0.648-36.amzn2.0.1
  • M
Improper Input Validation

<0:2.0.0.648-36.amzn2.0.1
  • M
Deserialization of Untrusted Data

<0:2.0.0.648-36.amzn2.0.1
  • M
Link Following

<0:2.0.0.648-36.amzn2.0.1
  • M
Improper Verification of Cryptographic Signature

<0:2.0.0.648-36.amzn2.0.1
  • M
HTTP Response Splitting

<0:2.0.0.648-36.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.0.648-36.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
Arbitrary Code Injection

<0:2.0.0.648-35.amzn2.0.1
  • H
CVE-2018-16395

<0:2.0.0.648-34.amzn2.0.1
  • M
Cross-site Scripting (XSS)

<0:2.0.0.648-33.amzn2.0.1
  • M
Directory Traversal

<0:2.0.0.648-33.amzn2.0.1
  • M
Improper Input Validation

<0:2.0.0.648-33.amzn2.0.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.0.648-33.amzn2.0.1
  • M
Deserialization of Untrusted Data

<0:2.0.0.648-33.amzn2.0.1
  • M
Improper Verification of Cryptographic Signature

<0:2.0.0.648-33.amzn2.0.1
  • M
Link Following

<0:2.0.0.648-33.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.0.0.648-33.amzn2.0.1