Show filters
164 Total Results
Displaying 21-30 of 164
Sort by:
Attacker Value
Unknown
CVE-2024-39308
Disclosure Date: July 08, 2024 (last updated August 23, 2024)
RailsAdmin is a Rails engine that provides an interface for managing data. RailsAdmin list view has the XSS vulnerability, caused by improperly-escaped HTML title attribute. Upgrade to 3.1.3 or 2.2.2 (to be released).
0
Attacker Value
Unknown
CVE-2024-32464
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.
0
Attacker Value
Unknown
CVE-2024-28103
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Action Pack is a framework for handling and responding to web requests. Since 6.1.0, the application configurable Permissions-Policy is only served on responses with an HTML related Content-Type. This vulnerability is fixed in 6.1.7.8, 7.0.8.2, and 7.1.3.3.
0
Attacker Value
Unknown
CVE-2024-26144
Disclosure Date: February 27, 2024 (last updated February 15, 2025)
Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.
0
Attacker Value
Unknown
CVE-2024-26143
Disclosure Date: February 27, 2024 (last updated February 14, 2025)
Rails is a web-application framework. There is a possible XSS vulnerability when using the translation helpers in Action Controller. Applications using translation methods like translate, or t on a controller, with a key ending in "_html", a :default key which contains untrusted user input, and the resulting string is used in a view, may be susceptible to an XSS vulnerability. The vulnerability is fixed in 7.1.3.1 and 7.0.8.1.
0
Attacker Value
Unknown
CVE-2024-26142
Disclosure Date: February 27, 2024 (last updated February 15, 2025)
Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected.
0
Attacker Value
Unknown
CVE-2023-46131
Disclosure Date: December 21, 2023 (last updated January 03, 2024)
Grails is a framework used to build web applications with the Groovy programming language. A specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable. This issue has been patched in version 3.3.17, 4.1.3, 5.3.4, 6.1.0.
0
Attacker Value
Unknown
CVE-2015-2179
Disclosure Date: December 12, 2023 (last updated December 15, 2023)
The xaviershay-dm-rails gem 0.10.3.8 for Ruby allows local users to discover MySQL credentials by listing a process and its arguments.
0
Attacker Value
Unknown
CVE-2023-27849
Disclosure Date: April 24, 2023 (last updated October 08, 2023)
rails-routes-to-json v1.0.0 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
0
Attacker Value
Unknown
CVE-2023-22799
Disclosure Date: February 09, 2023 (last updated October 08, 2023)
A ReDoS based DoS vulnerability in the GlobalID <1.0.1 which could allow an attacker supplying a carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.
0