Show filters
131 Total Results
Displaying 41-50 of 131
Sort by:
Attacker Value
Unknown

CVE-2020-8159

Disclosure Date: May 12, 2020 (last updated February 21, 2025)
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
Attacker Value
Unknown

CVE-2020-5267

Disclosure Date: March 19, 2020 (last updated February 21, 2025)
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
Attacker Value
Unknown

CVE-2010-3299

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
The encrypt/decrypt functions in Ruby on Rails 2.3 are vulnerable to padding oracle attacks.
Attacker Value
Unknown

CVE-2019-5418

Disclosure Date: March 27, 2019 (last updated October 06, 2023)
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
Attacker Value
Unknown

CVE-2019-5420

Disclosure Date: March 27, 2019 (last updated November 08, 2023)
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Attacker Value
Unknown

CVE-2019-5419

Disclosure Date: March 27, 2019 (last updated November 08, 2023)
There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
Attacker Value
Unknown

CVE-2018-16476

Disclosure Date: November 30, 2018 (last updated November 27, 2024)
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1.
0
Attacker Value
Unknown

CVE-2018-16477

Disclosure Date: November 30, 2018 (last updated November 27, 2024)
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. This vulnerability has been fixed in version 5.2.1.1.
0
Attacker Value
Unknown

CVE-2018-3741

Disclosure Date: March 30, 2018 (last updated November 26, 2024)
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
Attacker Value
Unknown

CVE-2017-17920

Disclosure Date: December 29, 2017 (last updated November 08, 2023)
SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input
0