ruby-libs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Resource Exhaustion

*
  • M
Out-of-bounds Read

*
  • M
Arbitrary Code Injection

*
  • M
Buffer Over-read

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
HTTP Response Splitting

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
Reliance on Cookies without Validation and Integrity Checking

*
  • M
Resource Exhaustion

*
  • C
Improper Handling of Syntactically Invalid Structure

<0:1.8.7.352-13.el6
  • M
Cryptographic Issues

<0:1.8.7.352-12.el6_4
  • M
Access Restriction Bypass

<0:1.8.7.352-10.el6_4
  • M
Improper Input Validation

<0:1.8.7.352-10.el6_4
  • M
Improper Input Validation

<0:1.8.7.352-4.el6_2
  • L
Improper Input Validation

<0:1.8.7.352-3.el6
  • L
Cryptographic Issues

<0:1.8.7.352-3.el6
  • M
Access Restriction Bypass

<0:1.8.7.299-7.el6_1.1
  • M
Link Following

<0:1.8.7.299-7.el6_1.1
  • M
Numeric Errors

<0:1.8.7.299-7.el6_1.1
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:1.8.7.374-3.el6_6
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<0:1.8.7.374-3.el6_6
  • M
XML External Entity (XXE) Injection

*
  • M
HTTP Request Smuggling

*
  • M
Directory Traversal

*
  • M
Null Byte Interaction Error (Poison Null Byte)

*
  • M
Resource Exhaustion

*
  • L
Directory Traversal

*
  • M
Arbitrary Code Injection

*
  • L
HTTP Response Splitting

*
  • M
Resource Exhaustion

*
  • M
Null Byte Interaction Error (Poison Null Byte)

*
  • H
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Write

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
HTTP Response Splitting

*
  • L
Arbitrary Command Injection

*
  • H
Improper Input Validation

*
  • M
Improper Output Neutralization for Logs

*
  • M
Information Exposure

*
  • M
Inadequate Encryption Strength

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Arbitrary Argument Injection

*
  • L
Privilege Defined With Unsafe Actions

*
  • M
Improper Input Validation

*
  • M
Improper Validation of Certificate with Host Mismatch

*
  • L
Arbitrary Code Injection

*
  • L
Cryptographic Issues

*
  • L
Privilege Defined With Unsafe Actions

*