Show filters
159 Total Results
Displaying 21-30 of 159
Sort by:
Attacker Value
Unknown

CVE-2024-0241

Disclosure Date: January 04, 2024 (last updated January 11, 2024)
encoded_id-rails versions before 1.0.0.beta2 are affected by an uncontrolled resource consumption vulnerability. A remote and unauthenticated attacker might cause a denial of service condition by sending an HTTP request with an extremely long "id" parameter.
Attacker Value
Unknown

CVE-2023-46131

Disclosure Date: December 21, 2023 (last updated January 03, 2024)
Grails is a framework used to build web applications with the Groovy programming language. A specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable. This issue has been patched in version 3.3.17, 4.1.3, 5.3.4, 6.1.0.
Attacker Value
Unknown

CVE-2015-2179

Disclosure Date: December 12, 2023 (last updated December 15, 2023)
The xaviershay-dm-rails gem 0.10.3.8 for Ruby allows local users to discover MySQL credentials by listing a process and its arguments.
Attacker Value
Unknown

CVE-2023-26153

Disclosure Date: October 06, 2023 (last updated October 14, 2023)
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. **Note:** An attacker can use this vulnerability to execute commands on the host system.
Attacker Value
Unknown

CVE-2023-30565

Disclosure Date: July 13, 2023 (last updated October 08, 2023)
An insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an attacker.
Attacker Value
Unknown

CVE-2023-30562

Disclosure Date: July 13, 2023 (last updated October 08, 2023)
A GRE dataset file within Systems Manager can be tampered with and distributed to PCUs.
Attacker Value
Unknown

CVE-2023-27849

Disclosure Date: April 24, 2023 (last updated October 08, 2023)
rails-routes-to-json v1.0.0 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
Attacker Value
Unknown

CVE-2023-28846

Disclosure Date: March 30, 2023 (last updated November 08, 2023)
Unpoly is a JavaScript framework for server-side web applications. There is a possible Denial of Service (DoS) vulnerability in the `unpoly-rails` gem that implements the Unpoly server protocol for Rails applications. This issues affects Rails applications that operate as an upstream of a load balancer's that uses passive health checks. The `unpoly-rails` gem echoes the request URL as an `X-Up-Location` response header. By making a request with exceedingly long URLs (paths or query string), an attacker can cause unpoly-rails to write a exceedingly large response header. If the response header is too large to be parsed by a load balancer downstream of the Rails application, it may cause the load balancer to remove the upstream from a load balancing group. This causes that application instance to become unavailable until a configured timeout is reached or until an active healthcheck succeeds. This issue has been fixed and released as version 2.7.2.2 which is available via RubyGems and …
Attacker Value
Unknown

CVE-2015-10083

Disclosure Date: February 21, 2023 (last updated October 20, 2023)
A vulnerability has been found in harrystech Dynosaur-Rails and classified as critical. Affected by this vulnerability is the function basic_auth of the file app/controllers/application_controller.rb. The manipulation leads to improper authentication. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 04b223813f0e336aab50bff140d0f5889c31dbec. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221503.
Attacker Value
Unknown

CVE-2023-22797

Disclosure Date: February 09, 2023 (last updated October 08, 2023)
An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.