Exploit for Deserialization of Untrusted Data in Rubyonrails
Reporter | Title | Published | Views | Family All 57 |
---|---|---|---|---|
![]() | ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore | 26 May 202014:49 | – | github |
![]() | Deserialization of Untrusted Data | 19 Jun 202000:00 | – | gitlab |
![]() | Ruby on Rails: Untrusted strings that are cache fetched with raw option are automatically marshal loaded | 24 Sep 201812:58 | – | hackerone |
![]() | CVE-2020-8165 | 19 Jun 202018:15 | – | osv |
![]() | ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore | 26 May 202014:49 | – | osv |
![]() | rails - security update | 19 Jun 202000:00 | – | osv |
![]() | ruby3.1-rubygem-activesupport-6.0-6.0.4.4-1.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | rails - security update | 20 Jul 202000:00 | – | osv |
![]() | rails - security update | 24 Sep 202000:00 | – | osv |
![]() | rmt-server-2.6.13-1.1 on GA media | 15 Jun 202400:00 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo