ruby2.5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ruby2.5 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
CVE-2024-39908

*
  • M
Inefficient Regular Expression Complexity

*
  • M
CVE-2024-35176

*
  • M
CVE-2024-27282

*
  • M
Inefficient Regular Expression Complexity

<2.5.1-1ubuntu1.16+esm1
  • M
Inefficient Regular Expression Complexity

<2.5.1-1ubuntu1.16
  • M
Inefficient Regular Expression Complexity

<2.5.1-1ubuntu1.16
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.13
  • L
Out-of-bounds Read

<2.5.1-1ubuntu1.12
  • M
Inefficient Regular Expression Complexity

<2.5.1-1ubuntu1.11
  • M
Reliance on Cookies without Validation and Integrity Checking

<2.5.1-1ubuntu1.11
  • M
Arbitrary Command Injection

<2.5.1-1ubuntu1.10
  • L
Exposure of Resource to Wrong Sphere

<2.5.1-1ubuntu1.10
  • M
Inadequate Encryption Strength

<2.5.1-1ubuntu1.10
  • M
XML External Entity (XXE) Injection

<2.5.1-1ubuntu1.9
  • L
HTTP Request Smuggling

<2.5.1-1ubuntu1.8
  • M
Improper Input Validation

<2.5.1-1ubuntu1.8
  • L
Information Exposure

<2.5.1-1ubuntu1.8
  • M
Improper Authentication

<2.5.1-1ubuntu1.6
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.6
  • M
CVE-2019-15845

<2.5.1-1ubuntu1.6
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.6
  • M
Directory Traversal

<2.5.1-1ubuntu1.2
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.2
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.2
  • M
Arbitrary Argument Injection

<2.5.1-1ubuntu1.2
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.2
  • M
Arbitrary Code Injection

<2.5.1-1ubuntu1.2
  • M
CVE-2018-16396

<2.5.1-1ubuntu1.1
  • M
CVE-2018-16395

<2.5.1-1ubuntu1.1
  • M
HTTP Response Splitting

<2.5.1-1
  • M
Directory Traversal

<2.5.1-1
  • M
Use of Externally-Controlled Format String

<2.5.1-1
  • L
Resource Exhaustion

<2.5.1-1
  • M
Improper Input Validation

<2.5.1-1
  • M
Directory Traversal

<2.5.1-1
  • M
Directory Traversal

<2.5.1-1
  • L
Link Following

<2.5.1-1
  • M
Deserialization of Untrusted Data

<2.5.1-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.5.1-1
  • M
Cross-site Scripting (XSS)

<2.5.1-1
  • L
Improper Verification of Cryptographic Signature

<2.5.1-1
  • M
Improper Input Validation

<2.5.1-1
  • M
Arbitrary Code Injection

<2.5.1-1