Логотип exploitDog
bind:CVE-2013-0156
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-0156

Количество 5

Количество 5

ubuntu логотип

CVE-2013-0156

около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

CVSS2: 7.5
EPSS: Критический
redhat логотип

CVE-2013-0156

около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

CVSS2: 7.5
EPSS: Критический
nvd логотип

CVE-2013-0156

около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

CVSS2: 7.5
EPSS: Критический
debian логотип

CVE-2013-0156

около 13 лет назад

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2. ...

CVSS2: 7.5
EPSS: Критический
github логотип

GHSA-jmgw-6vjg-jjwg

больше 8 лет назад

actionpack Improper Input Validation vulnerability

EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2013-0156

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

CVSS2: 7.5
92%
Критический
около 13 лет назад
redhat логотип
CVE-2013-0156

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

CVSS2: 7.5
92%
Критический
около 13 лет назад
nvd логотип
CVE-2013-0156

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.

CVSS2: 7.5
92%
Критический
около 13 лет назад
debian логотип
CVE-2013-0156

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2. ...

CVSS2: 7.5
92%
Критический
около 13 лет назад
github логотип
GHSA-jmgw-6vjg-jjwg

actionpack Improper Input Validation vulnerability

92%
Критический
больше 8 лет назад

Уязвимостей на страницу