active-support gem impersonates official activesupport gem, contains malware for arbitrary code executio
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | 13 Aug 201800:00 | – | gitlab |
![]() | Command Injection | 10 Aug 201800:00 | – | gitlab |
![]() | RubyGems: Malware in `active-support` gem | 9 Aug 201809:02 | – | hackerone |
![]() | CVE-2018-3779 | 10 Aug 201821:29 | – | cve |
![]() | CVE-2018-3779 | 10 Aug 201821:00 | – | cvelist |
![]() | active-support impersonates 'activesupport' gem | 13 Aug 201815:02 | – | osv |
![]() | Malicious ruby gem - active-support | 8 Aug 201821:00 | – | rubygems |
![]() | CVE-2018-3779 | 10 Aug 201821:29 | – | nvd |
![]() | Code injection | 10 Aug 201821:29 | – | prion |
![]() | CVE-2018-3779 | 10 Aug 201800:00 | – | ubuntucve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo