Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
CVE ID: | CVE-2019-8322 |
Description: | An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.891735 1.3.6.1.4.1.25623.1.0.891796 1.3.6.1.4.1.25623.1.0.892330 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-8322 https://hackerone.com/reports/315087 https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html SuSE Security Announcement: openSUSE-SU-2019:1771 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html |