A flaw in rubygem-secure_headers allows directive injection, leading to potential script-src override
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
![]() | secure_headers directive injection using semicolon | 22 Jan 202021:00 | – | rubygems |
![]() | Directive injection when using dynamic overrides with user input | 23 Jan 202002:28 | – | github |
![]() | Code injection | 23 Jan 202003:15 | – | prion |
![]() | CVE-2020-5217 | 23 Jan 202000:00 | – | ubuntucve |
![]() | CVE-2020-5217 | 23 Jan 202003:15 | – | nvd |
![]() | CVE-2020-5217 Directive injection when using dynamic overrides with user input in RubyGems secure_headers | 23 Jan 202002:15 | – | cvelist |
![]() | Authorization Bypass | 23 Jan 202006:12 | – | veracode |
![]() | CVE-2020-5217 | 23 Jan 202003:15 | – | cve |
![]() | GHSA-XQ52-RV6W-397C Directive injection when using dynamic overrides with user input | 23 Jan 202002:28 | – | osv |
![]() | CVE-2020-5217 | 23 Jan 202003:15 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo