Vulnerability & Exploit Database

Displaying entries 1 - 10 of 14 in total

Results for: CVE-2008-3790 Back to search

Vulnerabilities deemed not relevant on Red Hat Enterprise Linux 7 Vulnerability

  • Severity: 1
  • Published: June 10, 2014

This is a placeholder for all CVEs that are not relevant for one reason or another on Red Hat Enterprise Linux 7. Oftentimes Red Hat makes this determination because the affected software was shipped, built or configured in a manner that it made it invulnerable to a given vulnerability.

Vulnerabilities deemed not relevant on Red Hat Enterprise Linux 6 Vulnerability

  • Severity: 1
  • Published: November 10, 2010

This is a placeholder for all CVEs that are not relevant for one reason or another on Red Hat Enterprise Linux 6. Oftentimes Red Hat makes this determination because the affected software was shipped, built or configured in a manner that it made it invulnerable to a given vulnerability.

SUSE Linux Security Advisory: SUSE-SA:2009:037 Vulnerability

  • Severity: 10
  • Published: July 14, 2009

Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.

USN-691-1: Ruby vulnerability Vulnerability

  • Severity: 5
  • Published: August 27, 2008

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

SUSE Linux Security Vulnerability: CVE-2008-3790 Vulnerability

  • Severity: 5
  • Published: August 27, 2008

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

Gentoo Linux: CVE-2008-3790: Ruby: Multiple vulnerabilities Vulnerability

  • Severity: 5
  • Published: August 27, 2008

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

Cent OS: CVE-2008-3790: CESA-2008:0897 (ruby) Vulnerability

  • Severity: 5
  • Published: August 27, 2008

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

OS X update for ruby (CVE-2008-3790) Vulnerability

  • Severity: 5
  • Published: August 27, 2008

The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."

USN-651-1: Ruby vulnerabilities Vulnerability

  • Severity: 8
  • Published: August 12, 2008

Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTT...

RHSA-2008:0897: ruby security update Vulnerability

  • Severity: 8
  • Published: August 12, 2008

Ruby is an interpreted scripting language for quick and easyobject-oriented programming.The Ruby DNS resolver library, resolv.rb, used predictable transaction IDsand a fixed source port when sending DNS requests. A remote attacker coulduse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)Ruby's XML document parsing mod...