5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 High
AI Score
Confidence
Low
0.006 Low
EPSS
Percentile
79.5%
It was discovered that the Ruby JSON gem incorrectly handled certain JSON
files. If a user or automated system were tricked into parsing a specially
crafted JSON file, a remote attacker could use this issue to execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04
LTS. (CVE-2020-10663)
It was discovered that Ruby incorrectly handled certain socket memory
operations. A remote attacker could possibly use this issue to obtain
sensitive information. This issue only affected Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-10933)
It was discovered that Ruby incorrectly handled certain transfer-encoding
headers when using Webrick. A remote attacker could possibly use this issue
to bypass a reverse proxy. (CVE-2020-25613)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.10 | noarch | libruby2.7 | < 2.7.1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | libruby2.7-dbgsym | < 2.7.1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | ruby2.7 | < 2.7.1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | ruby2.7-dbgsym | < 2.7.1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | ruby2.7-dev | < 2.7.1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 20.10 | noarch | ruby2.7-doc | < 2.7.1-3ubuntu1.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | libruby2.7 | < 2.7.0-5ubuntu1.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | libruby2.7-dbgsym | < 2.7.0-5ubuntu1.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | ruby2.7 | < 2.7.0-5ubuntu1.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | ruby2.7-dbgsym | < 2.7.0-5ubuntu1.3 | UNKNOWN |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 High
AI Score
Confidence
Low
0.006 Low
EPSS
Percentile
79.5%