Show filters
164 Total Results
Displaying 1-10 of 164
Sort by:
Attacker Value
Unknown
CVE-2022-35912
Disclosure Date: July 19, 2022 (last updated October 07, 2023)
In grails-databinding in Grails before 3.3.15, 4.x before 4.1.1, 5.x before 5.1.9, and 5.2.x before 5.2.1 (at least when certain Java 8 configurations are used), data binding allows a remote attacker to execute code by gaining access to the class loader.
3
Attacker Value
Very High
CVE-2013-0156
Disclosure Date: January 13, 2013 (last updated October 05, 2023)
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
1
Attacker Value
Unknown
CVE-2023-38037
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
ActiveSupport::EncryptedFile writes contents that will be encrypted to a
temporary file. The temporary file's permissions are defaulted to the user's
current `umask` settings, meaning that it's possible for other users on the
same system to read the contents of the temporary file.
Attackers that have access to the file system could possibly read the contents
of this temporary file while a user is editing it.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
0
Attacker Value
Unknown
CVE-2023-28362
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
0
Attacker Value
Unknown
CVE-2023-28120
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
0
Attacker Value
Unknown
CVE-2023-27539
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
There is a denial of service vulnerability in the header parsing component of Rack.
0
Attacker Value
Unknown
CVE-2023-27531
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code
0
Attacker Value
Unknown
CVE-2023-23913
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute.
0
Attacker Value
Unknown
CVE-2024-11777
Disclosure Date: January 07, 2025 (last updated January 07, 2025)
The Sell Media plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sell_media_search_form_gutenberg' shortcode in all versions up to, and including, 2.5.8.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-54133
Disclosure Date: December 10, 2024 (last updated December 21, 2024)
Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.
0