Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Yukihiro_matsumoto | 1.6 (including) | 1.6 (including) |
Ruby | Yukihiro_matsumoto | 1.6.1 (including) | 1.6.1 (including) |
Ruby | Yukihiro_matsumoto | 1.6.2 (including) | 1.6.2 (including) |
Ruby | Yukihiro_matsumoto | 1.6.3 (including) | 1.6.3 (including) |
Ruby | Yukihiro_matsumoto | 1.6.4 (including) | 1.6.4 (including) |
Ruby | Yukihiro_matsumoto | 1.6.5 (including) | 1.6.5 (including) |
Ruby | Yukihiro_matsumoto | 1.6.6 (including) | 1.6.6 (including) |
Ruby | Yukihiro_matsumoto | 1.6.7 (including) | 1.6.7 (including) |
Ruby | Yukihiro_matsumoto | 1.8 (including) | 1.8 (including) |
Ruby | Yukihiro_matsumoto | 1.8.1 (including) | 1.8.1 (including) |
Ruby | Yukihiro_matsumoto | 1.8.2_pre1 (including) | 1.8.2_pre1 (including) |
Ruby | Yukihiro_matsumoto | 1.8.2_pre2 (including) | 1.8.2_pre2 (including) |