Ruby Version Manager (RVM) before 1.2.1 writes file contents to a terminal without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via a crafted file, related to an "escape sequence injection vulnerability." NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN30414126/index.html - | |
References | () http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000005.html - | |
References | () http://osvdb.org/70521 - | |
References | () http://secunia.com/advisories/42952 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/45841 - | |
References | () http://www.vupen.com/english/advisories/2011/0174 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/64746 - |
Information
Published : 2011-01-20 19:00
Updated : 2025-04-11 00:51
NVD link : CVE-2010-3928
Mitre link : CVE-2010-3928
CVE.ORG link : CVE-2010-3928
JSON object : View
Products Affected
wayneeseguin
- ruby_version_manager
CWE