Security update for libextlib-ruby XML parse
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution | 7 Jan 201320:00 | – | rubygems |
![]() | Debian: Security Advisory (DLA-172-1) | 8 Mar 202300:00 | – | openvas |
![]() | CVE-2013-1802 | 9 Apr 201300:00 | – | ubuntucve |
![]() | extlib does not properly restrict casts of string values | 24 Oct 201718:33 | – | osv |
![]() | Type confusion | 9 Apr 201320:55 | – | prion |
![]() | CVE-2013-1802 | 9 Apr 201320:55 | – | cve |
![]() | extlib does not properly restrict casts of string values | 24 Oct 201718:33 | – | github |
![]() | CVE-2013-1802 | 9 Apr 201320:55 | – | nvd |
![]() | Security update for rubygem-extlib (important) | 3 Apr 201320:10 | – | suse |
![]() | CVE-2013-1802 | 9 Apr 201320:00 | – | cvelist |
Source | Link |
---|---|
debian | www.debian.org/lts/security/2015/dla-172 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo