Total vulnerabilities in the database
JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Software | From | Fixed in |
---|---|---|
jruby / jruby | - | 1.6.5.1 |