Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2012-4466

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.015
EPSS Ranking 80.8%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2012-4466
  • Ruby-Lang » Ruby » Version: 1.8.7
    cpe:2.3:a:ruby-lang:ruby:1.8.7
  • Ruby-Lang » Ruby » Version: 1.9.3
    cpe:2.3:a:ruby-lang:ruby:1.9.3
  • Ruby-Lang » Ruby » Version: 2.0
    cpe:2.3:a:ruby-lang:ruby:2.0
  • Ruby-Lang » Ruby » Version: 2.0.0
    cpe:2.3:a:ruby-lang:ruby:2.0.0


Contact Us

Shodan ® - All rights reserved