ruby2.3

Direct Vulnerabilities

Known vulnerabilities in the ruby2.3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

<2.3.1-2~ubuntu16.04.16+esm12
  • M
Inefficient Regular Expression Complexity

*
  • L
Resource Exhaustion

*
  • M
HTTP Request Smuggling

<2.3.1-2~ubuntu16.04.16+esm11
  • M
CVE-2024-47220

<2.3.1-2~ubuntu16.04.16+esm11
  • M
Improper Cross-boundary Removal of Sensitive Data

<2.3.1-2~ubuntu16.04.16+esm10
  • M
Allocation of Resources Without Limits or Throttling

<2.3.1-2~ubuntu16.04.16+esm10
  • M
Inefficient Regular Expression Complexity

<2.3.1-2~ubuntu16.04.16+esm10
  • M
CVE-2024-27281

<2.3.1-2~ubuntu16.04.16+esm9
  • M
Resource Exhaustion

<2.3.1-2~ubuntu16.04.16+esm11
  • M
Resource Exhaustion

<2.3.1-2~ubuntu16.04.16+esm11
  • M
CVE-2024-39908

<2.3.1-2~ubuntu16.04.16+esm11
  • M
Inefficient Regular Expression Complexity

<2.3.1-2~ubuntu16.04.16+esm10
  • M
CVE-2024-35176

<2.3.1-2~ubuntu16.04.16+esm11
  • M
Inefficient Regular Expression Complexity

<2.3.1-2~ubuntu16.04.16+esm8
  • M
Inefficient Regular Expression Complexity

<2.3.1-2~ubuntu16.04.16+esm7
  • M
Inefficient Regular Expression Complexity

<2.3.1-2~ubuntu16.04.16+esm7
  • M
Arbitrary Code Injection

<2.3.1-2~ubuntu16.04.16+esm4
  • L
Out-of-bounds Read

<2.3.1-2~ubuntu16.04.16+esm3
  • M
Inefficient Regular Expression Complexity

<2.3.1-2~ubuntu16.04.16+esm2
  • M
Reliance on Cookies without Validation and Integrity Checking

<2.3.1-2~ubuntu16.04.16+esm2
  • M
Arbitrary Command Injection

<2.3.1-2~ubuntu16.04.16+esm1
  • L
Exposure of Resource to Wrong Sphere

<2.3.1-2~ubuntu16.04.16+esm1
  • M
Inadequate Encryption Strength

<2.3.1-2~ubuntu16.04.16+esm1
  • M
XML External Entity (XXE) Injection

<2.3.1-2~ubuntu16.04.16
  • L
HTTP Request Smuggling

<2.3.1-2~ubuntu16.04.15
  • M
Improper Input Validation

<2.3.1-2~ubuntu16.04.15
  • M
Improper Authentication

<2.3.1-2~ubuntu16.04.14
  • M
Arbitrary Code Injection

<2.3.1-2~ubuntu16.04.14
  • M
CVE-2019-15845

<2.3.1-2~ubuntu16.04.14
  • M
Arbitrary Code Injection

<2.3.1-2~ubuntu16.04.14
  • M
Directory Traversal

<2.3.1-2~16.04.12
  • M
Arbitrary Code Injection

<2.3.1-2~16.04.12
  • M
Arbitrary Code Injection

<2.3.1-2~16.04.12
  • M
Arbitrary Argument Injection

<2.3.1-2~16.04.12
  • M
Arbitrary Code Injection

<2.3.1-2~16.04.12
  • M
Arbitrary Code Injection

<2.3.1-2~16.04.12
  • M
CVE-2018-16396

<2.3.1-2~16.04.11
  • M
CVE-2018-16395

<2.3.1-2~16.04.11
  • M
Directory Traversal

<2.3.1-2~16.04.9
  • M
Directory Traversal

<2.3.1-2~16.04.9
  • M
HTTP Response Splitting

<2.3.1-2~16.04.10
  • M
Improper Input Validation

<2.3.1-2~16.04.9
  • L
Resource Exhaustion

<2.3.1-2~16.04.10
  • M
Use of Externally-Controlled Format String

<2.3.1-2~16.04.9
  • M
Deserialization of Untrusted Data

<2.3.1-2~16.04.7
  • L
Improper Verification of Cryptographic Signature

<2.3.1-2~16.04.7
  • L
Link Following

<2.3.1-2~16.04.7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.3.1-2~16.04.7
  • M
Directory Traversal

<2.3.1-2~16.04.7
  • M
Cross-site Scripting (XSS)

<2.3.1-2~16.04.7
  • M
Improper Input Validation

<2.3.1-2~16.04.7
  • M
Arbitrary Code Injection

<2.3.1-2~16.04.5
  • M
OS Command Injection

<2.3.1-2~16.04.4
  • M
Deserialization of Untrusted Data

<2.3.1-2~16.04.6
  • M
Out-of-Bounds

<2.3.1-2~16.04.5
  • M
Improper Authentication

<2.3.1-2~16.04.5
  • M
Use of Externally-Controlled Format String

<2.3.1-2~16.04.10
  • L
Improper Input Validation

<2.3.1-2~16.04.6
  • M
Origin Validation Error

<2.3.1-2~16.04.6
  • L
Arbitrary Code Injection

<2.3.1-2~16.04.6
  • M
Improper Input Validation

<2.3.1-2~16.04.6
  • L
Out-of-Bounds

<2.3.1-2~16.04.5
  • M
CRLF Injection

<2.3.1-2~16.04.2
  • L
Inadequate Encryption Strength

<2.3.1-2~16.04.2