ruby2.5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby2.5 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-35176

*
  • L
CVE-2024-27282

*
  • L
CVE-2024-27280

*
  • L
CVE-2024-27281

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

<2.5.5-3+deb10u5
  • M
Inefficient Regular Expression Complexity

<2.5.5-3+deb10u5
  • H
Arbitrary Code Injection

<2.5.5-3+deb10u6
  • H
Out-of-bounds Read

<2.5.5-3+deb10u6
  • H
Reliance on Cookies without Validation and Integrity Checking

<2.5.5-3+deb10u4
  • H
Inefficient Regular Expression Complexity

<2.5.5-3+deb10u4
  • H
Inadequate Encryption Strength

<2.5.5-3+deb10u4
  • H
Arbitrary Command Injection

<2.5.5-3+deb10u4
  • M
Exposure of Resource to Wrong Sphere

<2.5.5-3+deb10u4
  • H
XML External Entity (XXE) Injection

<2.5.5-3+deb10u4
  • H
HTTP Request Smuggling

<2.5.5-3+deb10u3
  • M
Information Exposure

<2.5.5-3+deb10u2
  • H
Improper Input Validation

<2.5.5-3+deb10u2
  • H
Improper Authentication

<2.5.5-3+deb10u1
  • H
Arbitrary Code Injection

<2.5.5-3+deb10u1
  • M
CVE-2019-15845

<2.5.5-3+deb10u1
  • M
Arbitrary Code Injection

<2.5.5-3+deb10u1
  • H
Directory Traversal

<2.5.5-1
  • H
Arbitrary Code Injection

<2.5.5-1
  • H
Arbitrary Code Injection

<2.5.5-1
  • H
Arbitrary Argument Injection

<2.5.5-1
  • H
Arbitrary Code Injection

<2.5.5-1
  • H
Arbitrary Code Injection

<2.5.5-1
  • H
CVE-2018-16396

<2.5.3-1
  • C
CVE-2018-16395

<2.5.3-1
  • H
Use of Externally-Controlled Format String

<2.5.1-1
  • H
Resource Exhaustion

<2.5.1-1
  • C
Directory Traversal

<2.5.1-1
  • H
Improper Input Validation

<2.5.1-1
  • M
HTTP Response Splitting

<2.5.1-1
  • H
Directory Traversal

<2.5.1-1
  • H
Link Following

<2.5.0-5
  • M
Cross-site Scripting (XSS)

<2.5.0-5
  • H
Deserialization of Untrusted Data

<2.5.0-5
  • C
Improper Verification of Cryptographic Signature

<2.5.0-5
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.5.0-5
  • M
Directory Traversal

<2.5.0-5
  • M
Improper Input Validation

<2.5.0-5
  • C
Arbitrary Code Injection

<2.5.0-1
  • H
OS Command Injection

<2.5.0~rc1-1