7.5
CVE-2005-2337
- EPSS 23.92%
- Published 07.10.2005 23:02:00
- Last modified 03.04.2025 01:03:51
- Source cret@cert.org
- Teams watchlist Login
- Open Login
Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
Data is provided by the National Vulnerability Database (NVD)
Yukihiro Matsumoto ≫ Ruby Version1.6
Yukihiro Matsumoto ≫ Ruby Version1.6.1
Yukihiro Matsumoto ≫ Ruby Version1.6.2
Yukihiro Matsumoto ≫ Ruby Version1.6.3
Yukihiro Matsumoto ≫ Ruby Version1.6.4
Yukihiro Matsumoto ≫ Ruby Version1.6.5
Yukihiro Matsumoto ≫ Ruby Version1.6.6
Yukihiro Matsumoto ≫ Ruby Version1.6.7
Yukihiro Matsumoto ≫ Ruby Version1.8
Yukihiro Matsumoto ≫ Ruby Version1.8.1
Yukihiro Matsumoto ≫ Ruby Version1.8.2_pre1
Yukihiro Matsumoto ≫ Ruby Version1.8.2_pre2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 23.92% | 0.958 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|