Lucene search

K

Active Record contains deserialization of arbitrary YAML

πŸ—“οΈΒ 24 Oct 2017Β 18:37:33Reported byΒ GitHub Advisory DatabaseTypeΒ 
github
Β github
πŸ”—Β github.comπŸ‘Β 36Β Views

Active Record YAML deserialization vulnerability in Ruby on Rail

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Refs
ReporterTitlePublishedViews
Family
Cvelist
CVE-2013-0277
13 Feb 201301:00
–cvelist
RubySec
CVE-2013-0277 rubygem-activerecord: Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0
10 Feb 201320:00
–rubygems
NVD
CVE-2013-0277
13 Feb 201301:55
–nvd
seebug.org
Ruby on Rails θΏœη¨‹δ»£η ζ‰§θ‘ŒζΌζ΄ž(CVE-2013-0277)
7 Mar 201300:00
–seebug
CVE
CVE-2013-0277
13 Feb 201301:55
–cve
UbuntuCve
CVE-2013-0277
13 Feb 201300:00
–ubuntucve
Debian CVE
CVE-2013-0277
13 Feb 201301:55
–debiancve
OSV
CVE-2013-0277
13 Feb 201301:55
–osv
OSV
GHSA-FHJ9-CJJH-27VM Active Record contains deserialization of arbitrary YAML
24 Oct 201718:33
–osv
OSV
DSA-2620-1 rails - several
12 Feb 201300:00
–osv
Rows per page
Vulners

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Oct 2017 18:33Current
8.2High risk
Vulners AI Score8.2
CVSS210
EPSS0.07162
36
.json
Report