Ruby versions 1.8.7, 1.9.3, and 2.0 allow bypass of safe-level restriction
Reporter | Title | Published | Views | Family All 180 |
---|---|---|---|---|
![]() | Code injection | 25 Apr 201323:55 | – | prion |
![]() | Design/Logic Flaw | 25 Apr 201323:55 | – | prion |
![]() | Design/Logic Flaw | 2 Mar 201120:00 | – | prion |
![]() | Design/Logic Flaw | 2 May 201314:55 | – | prion |
![]() | Amazon Linux AMI : ruby (ALAS-2012-139) | 4 Sep 201300:00 | – | nessus |
![]() | Fedora 16 : ruby-1.8.7.358-4.fc16 (2012-15507) | 15 Oct 201200:00 | – | nessus |
![]() | Ubuntu 12.04 LTS : ruby1.9.1 vulnerabilities (USN-1602-1) | 11 Oct 201200:00 | – | nessus |
![]() | Fedora 17 : ruby-1.9.3.194-17.fc17 (2012-15395) | 15 Oct 201200:00 | – | nessus |
![]() | Fedora 18 : ruby-1.9.3.194-18.fc18 (2012-15376) | 9 Oct 201200:00 | – | nessus |
![]() | Ubuntu 12.10 : ruby1.8 vulnerabilities (USN-1603-2) | 23 Oct 201200:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo