Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows malicious users to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
yukihiro matsumoto ruby 1.6.1 |
||
yukihiro matsumoto ruby 1.6.2 |
||
yukihiro matsumoto ruby 1.8.1 |
||
yukihiro matsumoto ruby 1.8.2_pre1 |
||
yukihiro matsumoto ruby 1.6.3 |
||
yukihiro matsumoto ruby 1.6.4 |
||
yukihiro matsumoto ruby 1.8.2_pre2 |
||
yukihiro matsumoto ruby 1.6 |
||
yukihiro matsumoto ruby 1.6.7 |
||
yukihiro matsumoto ruby 1.8 |
||
yukihiro matsumoto ruby 1.6.5 |
||
yukihiro matsumoto ruby 1.6.6 |