{"id":"CVE-2016-2337","details":"Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as \"retval\" argument can cause arbitrary code execution.","modified":"2026-04-16T01:47:52.025472347Z","published":"2017-01-06T21:59:00.460Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/91233"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00028.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-18"},{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2016-0031/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ruby/ruby","events":[{"introduced":"0"},{"last_affected":"a9721a259665149b1b9ff0beabcf5f8dc0136120"},{"last_affected":"d40ea2afa6ff5a6e5befcf342fb7b6dc58796b20"}],"database_specific":{"source":"CPE_FIELD","cpe":["cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*","cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"2.2.2"},{"last_affected":"2.3.0"}]}}],"versions":["v1_0_r2","v2_2_0_rc1","v2_2_2","v2_3_0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2337.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}