- http://www.cvedetails.com/product/22568/Rubyonrails-Ruby-On-...
- http://www.cvedetails.com/vulnerability-list/vendor_id-12043...
Django: http://www.cvedetails.com/product/18211/Djangoproject-Django...
PHP: http://www.cvedetails.com/product/128/PHP-PHP.html?vendor_id...
JRE: http://www.cvedetails.com/product/19117/Oracle-JRE.html?vend...
.Net: http://www.cvedetails.com/product/2002/Microsoft-.net-Framew...
Picking on it for having vulnerabilities without providing something in the way of a comparison is not very meaningful.
For example, all new gem releases should be signed and `HighSecurity` should be the policy but it's taken years to get very little progress. Changing to that policy would prevent entire classes of attacks, attacks that could subtly inject code into all sorts of apps in difficult-to-find ways. Large projects are still shipping unsigned gems, unsigned commits and unsigned tags. If RubyGems were hacked, progress might move slightly faster.
That being said, there's great services like GemCanary (https://gemcanary.com/) that will read your Gemfile and produce a list of vulnerable packages for you automatically. It'll even email you alerts when there's problems.
The security story in Rails might not be perfect, but at least there's reporting and tools.
Keep pushing for signed packages, though. Long overdue.