A deserialization vulnerability in Rails < 5.2.4.3, < 6.0.3.1 can lead to information leakage
Reporter | Title | Published | Views | Family All 51 |
---|---|---|---|---|
SUSE Linux | Security update for rubygem-actionpack-5_1 (important) | 26 Sep 202000:00 | – | suse |
SUSE Linux | Security update for rubygem-actionpack-5_1 (important) | 26 Sep 202000:00 | – | suse |
SUSE Linux | Security update for rubygem-actionpack-5_1 (important) | 29 Sep 202000:00 | – | suse |
SUSE Linux | Security update for rmt-server (important) | 21 Nov 202000:00 | – | suse |
SUSE Linux | Security update for rmt-server (important) | 23 Nov 202000:00 | – | suse |
OSV | Possible Strong Parameters Bypass in ActionPack | 26 May 202015:09 | – | osv |
OSV | CVE-2020-8164 | 19 Jun 202017:15 | – | osv |
OSV | rails - security update | 19 Jun 202000:00 | – | osv |
OSV | rails - security update | 20 Jul 202000:00 | – | osv |
OSV | rails - security update | 24 Sep 202000:00 | – | osv |
[
{
"product": "https://github.com/rails/rails",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "5.2.4.3, 6.0.3.1"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo