Ruby on Rails JSON to YAML conversion vulnerability in versions 2.3.x and 3.0.x allows remote code execution and SQL injectio
Reporter | Title | Published | Views | Family All 195 |
---|---|---|---|---|
![]() | Ruby on Rails JSON Processor YAML Deserialization Scanner | 11 Feb 201322:48 | â | metasploit |
![]() | Ruby on Rails JSON Processor YAML Deserialization Code Execution | 29 Jan 201303:05 | â | metasploit |
![]() | Ruby on Rails XML Processor YAML Deserialization Code Execution | 10 Jan 201305:10 | â | metasploit |
![]() | Ruby on Rails XML Processor YAML Deserialization Scanner | 9 Jan 201318:50 | â | metasploit |
![]() | Ruby on Rails Known Secret Session Cookie Remote Code Execution | 26 Jul 201318:23 | â | metasploit |
![]() | activesupport in Rails vulnerable to incorrect data conversion | 24 Oct 201718:33 | â | osv |
![]() | RHSA-2013:0202 Red Hat Security Advisory: rubygem-activesupport security update | 15 Sep 202420:33 | â | osv |
![]() | actionpack Improper Input Validation vulnerability | 24 Oct 201718:33 | â | osv |
![]() | rails - insufficient input validation | 9 Jan 201300:00 | â | osv |
![]() | OPENSUSE-SU-2024:10188-1 ruby2.2-rubygem-extlib-0.9.16-7.4 on GA media | 15 Jun 202400:00 | â | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo