Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6496

Опубликовано: 04 янв. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.

РелизСтатусПримечание
devel

not-affected

contains no code
esm-apps/xenial

not-affected

contains no code
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [contains no code]]
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

not-affected

contains no code
precise

not-affected

contains no code
precise/esm

DNE

precise was not-affected [contains no code]
quantal

not-affected

contains no code
raring

not-affected

contains no code

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.2.16-1]]
hardy

DNE

lucid

DNE

oneiric

DNE

precise

DNE

precise/esm

DNE

quantal

ignored

end of life
raring

ignored

end of life
saucy

not-affected

3.2.13-4

Показывать по

EPSS

Процентиль: 84%
0.02213
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.

nvd
около 13 лет назад

SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.

debian
около 13 лет назад

SQL injection vulnerability in the Active Record component in Ruby on ...

github
больше 8 лет назад

Active Record contains SQL Injection

EPSS

Процентиль: 84%
0.02213
Низкий

7.5 High

CVSS2