Extlib gem 0.9.15 and earlier for Ruby allows remote attackers to conduct object-injection attacks and execute arbitrary code or cause a denial of service
Reporter | Title | Published | Views | Family All 181 |
---|---|---|---|---|
![]() | CVE-2013-1802 | 9 Apr 201300:00 | – | ubuntucve |
![]() | CVE-2013-0156 | 13 Jan 201300:00 | – | ubuntucve |
![]() | CVE-2013-1800 | 9 Apr 201300:00 | – | ubuntucve |
![]() | extlib does not properly restrict casts of string values | 24 Oct 201718:33 | – | osv |
![]() | libextlib-ruby - security update | 14 Mar 201500:00 | – | osv |
![]() | rails - insufficient input validation | 9 Jan 201300:00 | – | osv |
![]() | actionpack Improper Input Validation vulnerability | 24 Oct 201718:33 | – | osv |
![]() | Red Hat Security Advisory: Ruby on Rails security update | 15 Sep 202420:31 | – | osv |
![]() | ruby2.2-rubygem-extlib-0.9.16-7.4 on GA media | 15 Jun 202400:00 | – | osv |
![]() | activesupport in Rails vulnerable to incorrect data conversion | 24 Oct 201718:33 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo