Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2012-4464

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 63.5%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2012-4464
  • Ruby-Lang » Ruby » Version: 1.9.3
    cpe:2.3:a:ruby-lang:ruby:1.9.3
  • Ruby-Lang » Ruby » Version: 2.0
    cpe:2.3:a:ruby-lang:ruby:2.0
  • Ruby-Lang » Ruby » Version: 2.0.0
    cpe:2.3:a:ruby-lang:ruby:2.0.0


Contact Us

Shodan ® - All rights reserved