Sha256: 4a356fa782490eb5a9da1b79fe6a005d9f9bc51ad61a2b87d735b999265f7cd3

Contents?: true

Size: 483 Bytes

Versions: 6

Compression:

Stored size: 483 Bytes

Contents

---
engine: ruby
cve: 2011-4815
osvdb: 78118
url: http://www.osvdb.org/show/osvdb/78118
title: Ruby Hash Collision Form Parameter Parsing Remote DoS
date: 2011-12-28
description: |
  Ruby contains a flaw that may allow a remote denial of service. The issue
  is triggered when an attacker sends multiple crafted parameters which trigger hash
  collisions, and will result in loss of availability for the program via CPU consumption.
cvss_v2: 7.8
patched_versions:
  - ">= 1.8.7.357"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2011-4815.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml
bundler-audit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml
bundler-audit-0.6.0 data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml
bundler-audit-0.5.0 data/ruby-advisory-db/rubies/ruby/OSVDB-78118.yml