| ID | CVE-2012-4466 | ||||||
| Sažetak | Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005. | ||||||
| Reference |
|
||||||
| CVSS |
|
||||||
| Pristup |
|
||||||
| Impact |
|
||||||
| CVSS vektor | AV:N/AC:L/Au:N/C:N/I:P/A:N | ||||||
| Zadnje važnije ažuriranje | 12-02-2014 - 04:39 | ||||||
| Objavljeno | 25-04-2013 - 23:55 |

