ruby3.2-rubygem-bigdecimal-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby3.2-rubygem-bigdecimal-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

<0:3.1.3-184.amzn2023.0.3
  • L
OS Command Injection

<0:3.1.3-184.amzn2023.0.4
  • M
HTTP Request Smuggling

<0:3.1.3-184.amzn2023.0.2
  • M
Inefficient Regular Expression Complexity

<0:3.1.3-183.amzn2023.0.4
  • M
Allocation of Resources Without Limits or Throttling

<0:3.1.3-183.amzn2023.0.4
  • M
Improper Validation of Specified Type of Input

<0:3.1.3-183.amzn2023.0.4
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:3.1.3-183.amzn2023.0.2
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:3.1.3-183.amzn2023.0.1
  • M
Resource Exhaustion

<0:3.1.3-183.amzn2023.0.1
  • M
Resource Exhaustion

<0:3.1.3-183.amzn2023.0.1
  • M
Resource Exhaustion

<0:3.1.3-183.amzn2023.0.1
  • M
Allocation of Resources Without Limits or Throttling

<0:3.1.3-183.amzn2023.0.1
  • M
Incorrect Regular Expression

<0:3.1.3-180.amzn2023.0.5
  • H
HTTP Request Smuggling

<0:3.1.3-180.amzn2023.0.4
  • M
Out-of-bounds Read

<0:3.1.3-180.amzn2023.0.3
  • M
Arbitrary Code Injection

<0:3.1.3-180.amzn2023.0.3
  • H
Improper Input Validation

<0:3.1.3-180.amzn2023.0.1
  • H
Improper Input Validation

<0:3.1.3-180.amzn2023.0.1