Safe-level feature in Ruby allows attackers to modify strings via Exception#to_s metho
Reporter | Title | Published | Views | Family All 146 |
---|---|---|---|---|
UbuntuCve | CVE-2012-4481 | 5 Oct 201200:00 | – | ubuntucve |
UbuntuCve | CVE-2012-4466 | 3 Oct 201200:00 | – | ubuntucve |
UbuntuCve | CVE-2012-4464 | 3 Oct 201200:00 | – | ubuntucve |
Cvelist | CVE-2012-4481 | 2 May 201314:00 | – | cvelist |
Cvelist | CVE-2011-1005 | 2 Mar 201119:00 | – | cvelist |
Cvelist | CVE-2012-4466 | 25 Apr 201323:00 | – | cvelist |
Cvelist | CVE-2012-4464 | 25 Apr 201323:00 | – | cvelist |
Veracode | Unauthorized Modification | 15 Jan 201908:52 | – | veracode |
Veracode | Arbitrary Code Execution | 2 May 201904:45 | – | veracode |
Veracode | Access Control Bypass | 10 Apr 202000:59 | – | veracode |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | ruby1.8 | 1.8.7.249-2ubuntu0.1 | UNKNOWN |
ubuntu | 10.10 | noarch | ruby1.8 | 1.8.7.299-2ubuntu0.1 | UNKNOWN |
ubuntu | 11.04 | noarch | ruby1.8 | 1.8.7.302-2ubuntu0.1 | UNKNOWN |
ubuntu | 12.04 | noarch | ruby1.9.1 | 1.9.3.0-1ubuntu2.2 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo