Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-2705

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-05 Aug, 2011 | 21:00
Updated At-06 Aug, 2024 | 23:08
Rejected At-
Credits

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:05 Aug, 2011 | 21:00
Updated At:06 Aug, 2024 | 23:08
Rejected At:
▼CVE Numbering Authority (CNA)

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2011/07/12/14
mailing-list
x_refsource_MLIST
http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=722415
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/20/16
mailing-list
x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2011-1581.html
vendor-advisory
x_refsource_REDHAT
http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
x_refsource_CONFIRM
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
x_refsource_CONFIRM
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
vendor-advisory
x_refsource_FEDORA
http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/20/1
mailing-list
x_refsource_MLIST
http://redmine.ruby-lang.org/issues/4579
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/11/1
mailing-list
x_refsource_MLIST
http://www.securityfocus.com/bid/49015
vdb-entry
x_refsource_BID
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/12/14
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=722415
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/16
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1581.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
Resource:
x_refsource_CONFIRM
Hyperlink: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
Resource:
x_refsource_CONFIRM
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://redmine.ruby-lang.org/issues/4579
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/11/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.securityfocus.com/bid/49015
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
Resource:
vendor-advisory
x_refsource_FEDORA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2011/07/12/14
mailing-list
x_refsource_MLIST
x_transferred
http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
x_refsource_CONFIRM
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=722415
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/20/16
mailing-list
x_refsource_MLIST
x_transferred
http://www.redhat.com/support/errata/RHSA-2011-1581.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
x_refsource_CONFIRM
x_transferred
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
x_refsource_CONFIRM
x_transferred
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/20/1
mailing-list
x_refsource_MLIST
x_transferred
http://redmine.ruby-lang.org/issues/4579
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/11/1
mailing-list
x_refsource_MLIST
x_transferred
http://www.securityfocus.com/bid/49015
vdb-entry
x_refsource_BID
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/12/14
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=722415
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/16
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1581.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://redmine.ruby-lang.org/issues/4579
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/11/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.securityfocus.com/bid/49015
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:05 Aug, 2011 | 21:55
Updated At:11 Apr, 2025 | 00:51

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Ruby
ruby-lang
>>ruby>>Versions up to 1.8.7-334(inclusive)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7
cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7
cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7
cpe:2.3:a:ruby-lang:ruby:1.8.7:p72:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-160
cpe:2.3:a:ruby-lang:ruby:1.8.7-160:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-173
cpe:2.3:a:ruby-lang:ruby:1.8.7-173:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-248
cpe:2.3:a:ruby-lang:ruby:1.8.7-248:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-249
cpe:2.3:a:ruby-lang:ruby:1.8.7-249:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-299
cpe:2.3:a:ruby-lang:ruby:1.8.7-299:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-302
cpe:2.3:a:ruby-lang:ruby:1.8.7-302:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-330
cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.8.7-p21
cpe:2.3:a:ruby-lang:ruby:1.8.7-p21:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9
cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9
cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0
cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0
cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0-0
cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0-1
cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0-2
cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0-20060415
cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.0-20070709
cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.1
cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.2
cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.2
cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.2-p136
cpe:2.3:a:ruby-lang:ruby:1.9.2-p136:*:*:*:*:*:*:*
Ruby
ruby-lang
>>ruby>>1.9.2-p180
cpe:2.3:a:ruby-lang:ruby:1.9.2-p180:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.htmlsecalert@redhat.com
Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.htmlsecalert@redhat.com
N/A
http://redmine.ruby-lang.org/issues/4579secalert@redhat.com
N/A
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050secalert@redhat.com
Patch
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLogsecalert@redhat.com
N/A
http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLogsecalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/07/11/1secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/12/14secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/20/1secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/20/16secalert@redhat.com
Patch
http://www.redhat.com/support/errata/RHSA-2011-1581.htmlsecalert@redhat.com
N/A
http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/secalert@redhat.com
Patch
http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/secalert@redhat.com
Patch
http://www.securityfocus.com/bid/49015secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=722415secalert@redhat.com
Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://redmine.ruby-lang.org/issues/4579af854a3a-2127-422b-91ae-364da2661108
N/A
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050af854a3a-2127-422b-91ae-364da2661108
Patch
http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLogaf854a3a-2127-422b-91ae-364da2661108
N/A
http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLogaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/07/11/1af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/12/14af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/20/1af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/20/16af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.redhat.com/support/errata/RHSA-2011-1581.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/49015af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=722415af854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://redmine.ruby-lang.org/issues/4579
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/11/1
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/12/14
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/1
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/16
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1581.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/49015
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=722415
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063062.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063071.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://redmine.ruby-lang.org/issues/4579
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=32050
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_352/ChangeLog
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://svn.ruby-lang.org/repos/ruby/tags/v1_9_2_290/ChangeLog
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/11/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/12/14
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/20/16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.redhat.com/support/errata/RHSA-2011-1581.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.ruby-lang.org/en/news/2011/07/15/ruby-1-9-2-p290-is-released/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/49015
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=722415
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

223Records found

CVE-2009-2303
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.25%
||
7 Day CHG~0.00%
Published-02 Jul, 2009 | 10:00
Updated-07 Aug, 2024 | 05:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

index.php in Aardvark Topsites PHP 5.2.1 and earlier allows remote attackers to obtain sensitive information via a negative integer value for the start parameter in a search action, which reveals the installation path in an error message.

Action-Not Available
Vendor-avaticn/a
Product-aardvark_topsites_phpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-6676
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-2.94% / 85.92%
||
7 Day CHG~0.00%
Published-08 Apr, 2009 | 10:00
Updated-07 Aug, 2024 | 11:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

QuickerSite 1.8.5 allows remote attackers to obtain sensitive information via a request to showThumb.aspx without any parameters, which reveals the installation path in an error message.

Action-Not Available
Vendor-quickersiten/a
Product-quickersiten/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-4103
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.48% / 64.19%
||
7 Day CHG~0.00%
Published-18 Sep, 2008 | 17:47
Updated-07 Aug, 2024 | 10:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mailto (aka com_mailto) component in Joomla! 1.5 before 1.5.7 sends e-mail messages without validating the URL, which allows remote attackers to transmit spam.

Action-Not Available
Vendor-n/aJoomla!
Product-joomlacom_mailton/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-7787
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.31%
||
7 Day CHG~0.00%
Published-03 Jul, 2018 | 14:00
Updated-17 Sep, 2024 | 02:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Schneider Electric U.motion Builder software versions prior to v1.3.4, this vulnerability is due to improper validation of input of context parameter in HTTP GET request.

Action-Not Available
Vendor-
Product-u.motion_builderU.motion Builder
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4369
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.34% / 55.98%
||
7 Day CHG~0.00%
Published-03 Apr, 2019 | 17:43
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved state management. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xiphone_oswatchostvosiOS, macOS, tvOS, watchOS
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4321
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.30% / 52.65%
||
7 Day CHG~0.00%
Published-03 Apr, 2019 | 17:43
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osmac_os_xtvosiOS, macOS, tvOS
CWE ID-CWE-20
Improper Input Validation
CVE-2018-5136
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-7.5||HIGH
EPSS-1.10% / 77.20%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 05:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A shared worker created from a "data:" URL in one tab can be shared by another tab with a different origin, bypassing the same-origin policy. This vulnerability affects Firefox < 59.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxFirefox
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4279
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.70%
||
7 Day CHG~0.00%
Published-03 Apr, 2019 | 17:43
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An inconsistent user interface issue was addressed with improved state management. This issue affected versions prior to Safari 11.1.2.

Action-Not Available
Vendor-n/aApple Inc.
Product-safariSafari
CWE ID-CWE-20
Improper Input Validation
CVE-2015-6258
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.21% / 43.84%
||
7 Day CHG~0.00%
Published-22 Aug, 2015 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Internet Access Point Protocol (IAPP) module on Cisco Wireless LAN Controller (WLC) devices with software 8.1(104.37) allows remote attackers to trigger incorrect traffic forwarding via crafted IPv6 packets, aka Bug ID CSCuv40033.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-wireless_lan_controller_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-11698
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 58.62%
||
7 Day CHG~0.00%
Published-23 Jul, 2019 | 13:21
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

Action-Not Available
Vendor-Mozilla Corporation
Product-firefoxthunderbirdfirefox_esrThunderbirdFirefox ESRFirefox
CWE ID-CWE-20
Improper Input Validation
CVE-2015-4321
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.21% / 43.77%
||
7 Day CHG~0.00%
Published-20 Aug, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Unicast Reverse Path Forwarding (uRPF) implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(1.50), 9.3(2.100), 9.3(3), and 9.4(1) mishandles cases where an IP address belongs to an internal interface but is also in the ASA routing table, which allows remote attackers to bypass uRPF validation via spoofed packets, aka Bug ID CSCuv60724.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-4286
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.08% / 23.86%
||
7 Day CHG~0.00%
Published-29 Jul, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web framework in Cisco UCS Central Software 1.3(0.99) allows remote attackers to read arbitrary files via a crafted HTTP request, aka Bug ID CSCuu41377.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_system_central_softwaren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-0597
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.33% / 55.55%
||
7 Day CHG~0.00%
Published-02 Feb, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Forgot Password feature in Cisco WebEx Meetings Server 1.5(.1.131) and earlier allows remote attackers to enumerate administrative accounts via crafted packets, aka Bug IDs CSCuj67166 and CSCuj67159.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-webex_meetings_servern/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-9060
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.39% / 59.13%
||
7 Day CHG~0.00%
Published-24 Nov, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

Action-Not Available
Vendor-n/aMoodle Pty Ltd
Product-moodlen/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-5424
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.22% / 44.55%
||
7 Day CHG~0.00%
Published-07 Nov, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Secure Access Control System (ACS) 5.x before 5.2 Patch 11 and 5.3 before 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote attackers to bypass authentication by sending a valid username and a crafted password string, aka Bug ID CSCuc65634.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-secure_access_control_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-6053
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.40% / 60.07%
||
7 Day CHG~0.00%
Published-27 Apr, 2014 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenJPEG 1.5.1 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based out-of-bounds read.

Action-Not Available
Vendor-uclouvainn/a
Product-openjpegn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-16935
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-7.14% / 91.19%
||
7 Day CHG~0.00%
Published-24 Nov, 2017 | 07:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ametys before 4.0.3 requires authentication only for URIs containing a /cms/ substring, which allows remote attackers to bypass intended access restrictions via a direct request to /plugins/core-ui/servercomm/messages.xml, as demonstrated by changing the admin password by obtaining account details via a users/search.json request, and then modifying the account via an editUser request.

Action-Not Available
Vendor-ametysn/a
Product-ametysn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-5260
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-27.36% / 96.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 22:50
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
malicious URLs may cause Git to present stored credentials to the wrong server

Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.

Action-Not Available
Vendor-git-scmgitgitCanonical Ltd.openSUSEFedora ProjectDebian GNU/Linux
Product-ubuntu_linuxdebian_linuxfedoragitleapgit
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2017-11177
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.29%
||
7 Day CHG~0.00%
Published-06 Nov, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TRITON AP-EMAIL 8.2 before 8.2 IB does not properly restrict file access in an unspecified directory.

Action-Not Available
Vendor-websensen/a
Product-triton_ap_emailn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3441
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.86% / 74.19%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 17:41
Updated-13 Nov, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings and Cisco Webex Meetings Server Information Disclosure Vulnerability

A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to view sensitive information from the meeting room lobby. This vulnerability is due to insufficient protection of sensitive participant information. An attacker could exploit this vulnerability by browsing the Webex roster. A successful exploit could allow the attacker to gather information about other Webex participants, such as email address and IP address, while waiting in the lobby.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetings_serverwebex_meetingsCisco WebEx Meetings Server
CWE ID-CWE-20
Improper Input Validation
CVE-2016-9201
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.25% / 78.53%
||
7 Day CHG~0.00%
Published-14 Dec, 2016 | 00:37
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Zone-Based Firewall feature of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to pass traffic that should otherwise have been dropped based on the configuration. More Information: CSCuz21015. Known Affected Releases: 15.3(3)M3. Known Fixed Releases: 15.6(2)T0.1 15.6(2.0.1a)T0 15.6(2.19)T 15.6(3)M.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosCisco IOS and Cisco IOS XE
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-6652
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-3.01% / 86.07%
||
7 Day CHG~0.00%
Published-18 May, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web framework of the Cisco TelePresence IX5000 Series could allow an unauthenticated, remote attacker to access arbitrary files on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using directory traversal techniques to read files within the Cisco TelePresence IX5000 Series filesystem. This vulnerability affects Cisco TelePresence IX5000 Series devices running software version 8.2.0. Cisco Bug IDs: CSCvc52325.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_ix5000Cisco TelePresence IX5000 Series
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2016-10991
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.60% / 68.48%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 14:31
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The imdb-widget plugin before 1.0.9 for WordPress has Local File Inclusion.

Action-Not Available
Vendor-imdb-widget_projectn/a
Product-imdb-widgetn/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found