Количество 6
Количество 6
CVE-2023-38037
ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.
CVE-2023-38037
ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.
CVE-2023-38037
ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately.
CVE-2023-38037
ActiveSupport::EncryptedFile writes contents that will be encrypted to ...
openSUSE-SU-2023:0350-1
Security update for rubygem-activesupport-5.2
GHSA-cr5q-6q9f-rq6q
Active Support Possibly Discloses Locally Encrypted Files
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-38037 ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2023-38037 ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately. | CVSS3: 3.3 | 0% Низкий | больше 2 лет назад | |
CVE-2023-38037 ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file's permissions are defaulted to the user's current `umask` settings, meaning that it's possible for other users on the same system to read the contents of the temporary file. Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it. All users running an affected release should either upgrade or use one of the workarounds immediately. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2023-38037 ActiveSupport::EncryptedFile writes contents that will be encrypted to ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
openSUSE-SU-2023:0350-1 Security update for rubygem-activesupport-5.2 | 0% Низкий | больше 2 лет назад | ||
GHSA-cr5q-6q9f-rq6q Active Support Possibly Discloses Locally Encrypted Files | CVSS3: 5.5 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу