ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes
Reporter | Title | Published | Views | Family All 32 |
---|---|---|---|---|
![]() | Active Record contains deserialization of arbitrary YAML | 24 Oct 201718:33 | β | github |
![]() | Ruby on Rails θΏη¨δ»£η ζ§θ‘ζΌζ΄(CVE-2013-0277) | 7 Mar 201300:00 | β | seebug |
![]() | CVE-2013-0277 | 13 Feb 201301:55 | β | nvd |
![]() | CVE-2013-0277 | 13 Feb 201300:00 | β | ubuntucve |
![]() | CVE-2013-0277 | 13 Feb 201301:00 | β | cvelist |
![]() | CVE-2013-0277 rubygem-activerecord: Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0 | 10 Feb 201320:00 | β | rubygems |
![]() | CVE-2013-0277 | 13 Feb 201301:55 | β | debiancve |
![]() | Active Record contains deserialization of arbitrary YAML | 24 Oct 201718:33 | β | osv |
![]() | rails - several | 12 Feb 201300:00 | β | osv |
![]() | Code injection | 13 Feb 201301:55 | β | prion |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo