Логотип exploitDog
bind:"GHSA-cr5q-6q9f-rq6q" OR bind:"CVE-2023-38037"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-cr5q-6q9f-rq6q" OR bind:"CVE-2023-38037"

Количество 7

Количество 7

github логотип

GHSA-cr5q-6q9f-rq6q

больше 2 лет назад

Active Support Possibly Discloses Locally Encrypted Files

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2023-38037

около 1 года назад

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2023-38037

больше 2 лет назад

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 3.3
EPSS: Низкий
nvd логотип

CVE-2023-38037

около 1 года назад

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2023-38037

около 1 года назад

ActiveSupport::EncryptedFile writes contents that will be encrypted to ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2023:0350-1

больше 2 лет назад

Security update for rubygem-activesupport-5.2

EPSS: Низкий
redos логотип

ROS-20260216-73-0002

около 2 месяцев назад

Уязвимость rubygem-activesupport

CVSS2: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-cr5q-6q9f-rq6q

Active Support Possibly Discloses Locally Encrypted Files

CVSS3: 5.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-38037

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 5.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2023-38037

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 3.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-38037

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 5.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2023-38037

ActiveSupport::EncryptedFile writes contents that will be encrypted to ...

CVSS3: 5.5
0%
Низкий
около 1 года назад
suse-cvrf логотип
openSUSE-SU-2023:0350-1

Security update for rubygem-activesupport-5.2

0%
Низкий
больше 2 лет назад
redos логотип
ROS-20260216-73-0002

Уязвимость rubygem-activesupport

CVSS2: 5.3
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу