Lucene search

K
RubyonrailsRails

23 matches found

CVE
CVE
added 2020/07/02 7:15 p.m.181 views

CVE-2020-8185

A denial of service vulnerability exists in Rails

6.5CVSS6.2AI score0.01071EPSS
CVE
CVE
added 2020/06/19 6:15 p.m.177 views

CVE-2020-8167

A CSRF vulnerability exists in rails

6.5CVSS7.5AI score0.00592EPSS
CVE
CVE
added 2024/02/27 4:15 p.m.164 views

CVE-2024-26143

Rails is a web-application framework. There is a possible XSS vulnerability when using the translation helpers in Action Controller. Applications using translation methods like translate, or t on a controller, with a key ending in "_html", a :default key which contains untrusted user input, and the...

6.1CVSS6AI score0.01493EPSS
CVE
CVE
added 2021/02/11 6:15 p.m.137 views

CVE-2021-22881

The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website...

6.1CVSS6AI score0.06852EPSS
CVE
CVE
added 2012/06/22 2:55 p.m.121 views

CVE-2012-2660

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended databas...

6.4CVSS7.3AI score0.00462EPSS
CVE
CVE
added 2013/01/13 10:55 p.m.120 views

CVE-2013-0155

Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL...

6.4CVSS7.5AI score0.11368EPSS
CVE
CVE
added 2023/02/09 8:15 p.m.116 views

CVE-2023-22797

An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to...

6.1CVSS5.8AI score0.00135EPSS
CVE
CVE
added 2021/10/18 1:15 p.m.105 views

CVE-2021-22942

A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website.

6.1CVSS6AI score0.00545EPSS
CVE
CVE
added 2021/01/06 9:15 p.m.94 views

CVE-2020-8264

In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vuln...

6.1CVSS5.8AI score0.00346EPSS
CVE
CVE
added 2007/11/21 9:46 p.m.93 views

CVE-2007-6077

The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote a...

6.8CVSS9.5AI score0.09363EPSS
CVE
CVE
added 2022/01/10 2:10 p.m.90 views

CVE-2021-44528

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.

6.1CVSS5.8AI score0.26792EPSS
CVE
CVE
added 2011/02/14 9:0 p.m.89 views

CVE-2011-0447

Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that l...

6.8CVSS6.6AI score0.0275EPSS
CVE
CVE
added 2013/12/07 12:55 a.m.87 views

CVE-2013-6417

actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictio...

6.4CVSS7.5AI score0.11368EPSS
CVE
CVE
added 2016/09/07 7:28 p.m.85 views

CVE-2016-6316

Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.

6.1CVSS6.1AI score0.02193EPSS
CVE
CVE
added 2009/12/16 1:30 a.m.84 views

CVE-2008-7248

Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.

6.8CVSS9.6AI score0.11409EPSS
CVE
CVE
added 2021/06/11 4:15 p.m.84 views

CVE-2021-22903

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2...

6.1CVSS6AI score0.06852EPSS
CVE
CVE
added 2014/02/20 3:27 p.m.79 views

CVE-2014-0080

SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/cast.rb in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving \ (backslash) charact...

6.8CVSS7.8AI score0.00248EPSS
CVE
CVE
added 2018/11/30 7:29 p.m.79 views

CVE-2018-16477

A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the content-disposition and content-type parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as...

6.5CVSS6.2AI score0.0026EPSS
CVE
CVE
added 2010/10/28 12:0 a.m.71 views

CVE-2010-3933

Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.

6.4CVSS6.6AI score0.00712EPSS
CVE
CVE
added 2021/10/19 2:15 p.m.67 views

CVE-2011-1497

A cross-site scripting vulnerability flaw was found in the auto_link function in Rails before version 3.0.6.

6.1CVSS5.9AI score0.00328EPSS
CVE
CVE
added 2013/04/22 3:27 a.m.58 views

CVE-2013-3221

The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, and 3.2.x does not ensure that the declared data type of a database column is used during comparisons of input values to stored values in that column, which makes it easier for remote attackers to conduct data-type injection attacks ...

6.4CVSS6.6AI score0.00483EPSS
CVE
CVE
added 2019/11/12 9:15 p.m.46 views

CVE-2010-3299

The encrypt/decrypt functions in Ruby on Rails 2.3 are vulnerable to padding oracle attacks.

6.5CVSS6.4AI score0.00224EPSS
CVE
CVE
added 2024/06/04 8:15 p.m.42 views

CVE-2024-32464

Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.

6.1CVSS5.9AI score0.00112EPSS