RSS   Vulnerabilities for 'Jruby'   RSS

2012-11-28
 
CVE-2012-5370

CWE-310
 

 
JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.

 
2012-11-23
 
CVE-2010-1330

CWE-79
 

 
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

 
2011-12-29
 
CVE-2011-4838

CWE-20
 

 
JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

 

 >>> Vendor: Jruby 2 Products
Jruby
Jruby-openssl


Copyright 2024, cxsecurity.com

 

Back to Top