6.4

CVE-2013-2065

Exploit

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

Data is provided by the National Vulnerability Database (NVD)
OpensuseOpensuse Version12.2
OpensuseOpensuse Version12.3
Ruby-langRuby Version1.9
Ruby-langRuby Version1.9.1
Ruby-langRuby Version1.9.2
Ruby-langRuby Version1.9.3
Ruby-langRuby Version1.9.3 Updatep0
Ruby-langRuby Version1.9.3 Updatep125
Ruby-langRuby Version1.9.3 Updatep194
Ruby-langRuby Version1.9.3 Updatep286
Ruby-langRuby Version1.9.3 Updatep383
Ruby-langRuby Version1.9.3 Updatep385
Ruby-langRuby Version1.9.3 Updatep392
Ruby-langRuby Version2.0
Ruby-langRuby Version2.0.0
Ruby-langRuby Version2.0.0 Updatep0
Ruby-langRuby Version2.0.0 Updatepreview1
Ruby-langRuby Version2.0.0 Updatepreview2
Ruby-langRuby Version2.0.0 Updaterc1
Ruby-langRuby Version2.0.0 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.36% 0.575
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N