A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments
Reporter | Title | Published | Views | Family All 25 |
---|---|---|---|---|
![]() | CVE-2023-22794 | 26 Jan 202314:05 | – | redhatcve |
![]() | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 9 Feb 202300:00 | – | gitlab |
![]() | CVE-2023-22794 | 9 Feb 202320:15 | – | osv |
![]() | SQL Injection Vulnerability via ActiveRecord comments | 18 Jan 202318:20 | – | osv |
![]() | OPENSUSE-SU-2024:12766-1 ruby3.1-rubygem-activerecord-7.0-7.0.4.1-1.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | OPENSUSE-SU-2024:14069-1 ruby3.3-rubygem-activerecord-7.0-7.0.8.4-1.1 on GA media | 24 Jun 202400:00 | – | osv |
![]() | rails - security update | 13 Mar 202300:00 | – | osv |
![]() | RHSA-2023:6818 Red Hat Security Advisory: Satellite 6.14 security and bug fix update | 2 Oct 202411:32 | – | osv |
![]() | SQL Injection | 25 Jan 202304:39 | – | veracode |
![]() | CVE-2023-22794 | 9 Feb 202320:15 | – | nvd |
[
{
"vendor": "n/a",
"product": "https://github.com/rails/rails",
"versions": [
{
"version": "6.0.6.1, 6.1.7.1, 7.0.4.1",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo