CVE-2023-22794 |
A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the `annotate` query method, the `optimizer_hints` query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment. |
6.1.6.1,
7.0.3,
6.1.5,
6.1.4.7,
6.1.4.6,
6.0.4.8,
7.0.2,
6.0.4.7
, 7.0.1, 7.0.2.2, 7.0.3.1, 7.0.2.4, 6.0.4.6, 6.1.4.1, 7.0.4, 6.1.7, 6.0.6, 6.1.6, 6.0.5, 6.1.5.1, 7.0.2.3, 6.0.5.1, 6.1.2, 6.1.4.3, 6.0.3.2, 6.0.1, 6.0.0, 6.1.4.2, 6.0.3.6, 6.0.3.5, 6.1.2.1, 6.0.2, 6.0.4, 6.0.1.rc1, 6.1.4, 7.0.2.1, 7.0.0, 6.0.2.2, 6.0.2.1, 6.1.3.2, 6.1.3, 6.0.3.1, 6.1.1, 6.0.2.rc2, 6.0.4.2, 6.1.4.5, 6.1.3.1, 6.0.4.4, 6.0.4.1, 6.0.3.7, 6.0.2.rc1, 6.0.4.5, 6.1.4.4, 6.0.3.rc1, 6.0.3.4, 6.1.0, 6.0.4.3, 6.0.3, 6.0.3.3
(Show all)
|
Patch → 6.1.7.1 |
CVE-2022-44566 |
A denial of service vulnerability present in ActiveRecord's PostgreSQL adapter <7.0.4.1 and <6.1.7.1. When a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service. |
3.0.12,
1.14.4,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.0.2
, 3.0.6.rc2, 3.2.3, 3.0.11, 3.0.17, 2.3.10, 2.3.9.pre, 2.3.4, 2.3.5, 3.0.0.beta4, 2.3.18, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.1.5.rc1, 3.0.8, 1.3.0, 3.0.10.rc1, 3.0.6, 3.0.0.beta2, 3.2.7.rc1, 3.1.6, 1.13.1, 1.12.1, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.16, 3.0.15, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.3.17, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 3.2.9, 2.3.9, 3.2.7, 2.3.6, 3.0.0.beta, 3.2.8.rc2, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 1.15.2, 1.14.0, 3.0.8.rc4, 2.3.3, 3.0.0.rc, 3.2.9.rc2, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 3.2.6, 1.9.0, 1.5.0, 3.0.6.rc1, 2.2.2, 3.0.0.rc2, 3.0.0.beta3, 1.7.0, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 3.0.14, 1.8.0, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 3.2.5, 1.15.3, 1.5.1, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.13, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 1.13.2, 3.0.8.rc2, 2.3.15, 3.0.20, 4.1.1, 3.2.10, 3.2.13.rc2, 3.2.14.rc1, 3.1.0.rc4, 3.2.13.rc1, 3.2.12, 3.1.10, 3.2.15.rc1, 4.0.1, 3.1.0.rc6, 3.2.18, 3.2.15.rc3, 3.0.18, 3.2.0.rc2, 4.0.2, 4.0.1.rc4, 3.1.12, 3.2.15.rc2, 3.2.17, 3.2.14, 3.1.9, 3.1.0.rc5, 3.1.0.rc3, 3.2.13, 4.1.2.rc3, 4.1.0, 4.0.6, 4.0.6.rc3, 4.0.4.rc1, 4.0.1.rc1, 4.1.2.rc2, 3.1.11, 3.2.0.rc1, 4.1.2, 4.0.6.rc1, 4.0.7, 4.1.2.rc1, 4.0.1.rc3, 4.1.4, 4.0.6.rc2, 3.2.15, 4.0.4, 4.0.0, 3.1.0.rc1, 3.2.16, 4.0.1.rc2, 3.0.19, 3.1.0.beta1, 3.1.0.rc2, 3.2.14.rc2, 4.0.3, 4.0.5, 4.0.8, 4.1.3, 3.1.0.rc8, 3.2.11, 6.1.6.1, 4.1.8, 7.0.3, 5.2.6, 5.2.8.1, 6.1.5, 6.1.4.7, 5.2.6.2, 6.1.4.6, 5.2.8, 6.0.4.8, 6.0.6.1, 5.2.6.3, 7.0.2, 6.0.4.7, 7.0.1, 7.0.2.2, 7.0.3.1, 7.0.2.4, 5.2.7.1, 6.0.4.6, 6.1.4.1, 7.0.4, 6.1.7, 6.0.6, 6.1.6, 6.0.5, 6.1.5.1, 5.2.7, 7.0.2.3, 6.0.5.1, 6.1.2, 5.1.2, 6.1.4.3, 4.2.11.3, 5.1.3, 5.0.1.rc1, 6.0.3.2, 4.2.10, 6.0.1, 6.0.0, 5.2.4.3, 6.1.4.2, 4.0.13, 3.2.22.3, 6.1.0.rc1, 4.2.7.rc1, 5.1.4, 5.0.0.rc2, 6.0.3.6, 6.0.3.5, 4.1.14.rc2, 5.2.0.beta1, 4.1.15, 4.0.0.rc2, 5.1.0.rc2, 5.2.4.4, 6.1.2.1, 5.2.5, 4.1.0.rc1, 4.2.6, 3.2.19, 5.0.7.1, 3.2.22.4, 3.2.21, 6.0.2, 6.0.4, 6.0.1.rc1, 6.1.0.rc2, 6.0.0.beta3, 4.2.2, 5.2.4.1, 5.2.1.rc1, 5.1.5, 5.1.3.rc3, 6.0.0.beta1, 3.2.20, 5.1.1, 5.2.6.1, 6.1.4, 7.0.2.1, 7.0.0, 6.0.2.2, 6.0.2.1, 6.1.3.2, 6.0.0.rc2, 6.0.0.rc1, 5.2.4.6, 5.2.4, 5.2.4.rc1, 5.2.4.5, 5.2.2.1, 5.2.0, 5.2.0.rc1, 5.1.6, 5.1.3.rc2, 5.1.0, 5.0.7.2, 5.0.6.rc1, 5.0.0.beta1, 4.2.5, 4.2.5.rc1, 5.0.3, 5.0.0.rc1, 4.2.10.rc1, 4.2.1.rc2, 4.1.13.rc1, 4.2.0.rc3, 4.1.15.rc1, 4.1.14.2, 4.1.14.1, 4.1.12.rc1, 4.1.11, 4.1.10, 4.1.10.rc3, 4.1.9, 4.0.13.rc1, 4.0.10.rc2, 4.0.10.rc1, 4.0.0.rc1, 5.0.1, 5.0.4, 3.2.22.5, 4.2.5.2, 4.2.0, 5.0.0.beta4, 5.0.0.beta3, 5.0.0.beta2, 4.2.0.beta4, 4.1.7, 4.0.11.1, 4.0.9, 3.2.22.2, 4.1.0.beta2, 4.2.9.rc1, 4.2.5.rc2, 4.1.10.rc1, 4.1.9.rc1, 4.1.6.rc1, 4.1.0.rc2, 4.0.12, 4.0.11, 6.1.3, 5.2.0.beta2, 6.0.3.1, 6.1.1, 6.0.2.rc2, 5.2.2, 5.2.2.rc1, 4.2.1.rc3, 5.1.3.rc1, 5.1.0.beta1, 5.0.4.rc1, 5.0.2.rc1, 5.0.0, 4.1.10.rc2, 4.2.0.rc2, 5.2.3, 4.2.0.beta1, 5.2.1, 6.0.4.2, 5.0.5.rc2, 5.0.2, 4.1.16.rc1, 5.0.0.1, 5.2.1.1, 6.1.4.5, 4.1.0.beta1, 4.2.0.rc1, 6.1.3.1, 6.0.4.4, 6.0.4.1, 6.0.3.7, 5.1.0.rc1, 5.0.1.rc2, 5.0.0.beta1.1, 4.2.11, 4.2.11.1, 4.2.7, 4.2.6.rc1, 4.2.4, 4.2.4.rc1, 4.2.9, 4.2.7.1, 4.2.3, 4.2.1, 4.2.1.rc4, 4.1.12, 4.0.10, 3.2.22.1, 4.1.7.1, 4.1.6.rc2, 4.1.14, 4.2.9.rc2, 5.1.2.rc1, 5.0.5, 5.0.5.rc1, 6.0.2.rc1, 5.1.7, 5.1.5.rc1, 5.0.7, 4.1.13, 4.2.8, 6.0.4.5, 6.1.4.4, 4.2.11.2, 5.0.0.racecar1, 4.1.5, 4.1.10.rc4, 4.2.1.rc1, 5.1.4.rc1, 5.1.6.1, 5.1.6.2, 5.1.7.rc1, 5.2.0.rc2, 5.2.3.rc1, 5.2.4.2, 6.0.3.rc1, 6.0.0.beta2, 6.0.3.4, 6.1.0, 6.0.4.3, 3.2.22, 4.0.0.beta1, 4.1.6, 4.1.14.rc1, 4.1.16, 4.2.3.rc1, 4.2.5.1, 4.2.0.beta2, 4.2.0.beta3, 5.0.6, 4.2.8.rc1, 6.0.3, 6.0.3.3
(Show all)
|
Patch → 6.1.7.1 |
CVE-2022-32224 |
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE. |
3.0.12,
1.14.4,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.0.2
, 3.0.6.rc2, 3.2.3, 3.0.11, 3.0.17, 2.3.10, 2.3.9.pre, 2.3.4, 2.3.5, 3.0.0.beta4, 2.3.18, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.1.5.rc1, 3.0.8, 1.3.0, 3.0.10.rc1, 3.0.6, 3.0.0.beta2, 3.2.7.rc1, 3.1.6, 1.13.1, 1.12.1, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.16, 3.0.15, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.3.17, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 3.2.9, 2.3.9, 3.2.7, 2.3.6, 3.0.0.beta, 3.2.8.rc2, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 1.15.2, 1.14.0, 3.0.8.rc4, 2.3.3, 3.0.0.rc, 3.2.9.rc2, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 3.2.6, 1.9.0, 1.5.0, 3.0.6.rc1, 2.2.2, 3.0.0.rc2, 3.0.0.beta3, 1.7.0, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 3.0.14, 1.8.0, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 3.2.5, 1.15.3, 1.5.1, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.13, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 1.13.2, 3.0.8.rc2, 2.3.15, 3.0.20, 4.1.1, 3.2.10, 3.2.13.rc2, 3.2.14.rc1, 3.1.0.rc4, 3.2.13.rc1, 3.2.12, 3.1.10, 3.2.15.rc1, 4.0.1, 3.1.0.rc6, 3.2.18, 3.2.15.rc3, 3.0.18, 3.2.0.rc2, 4.0.2, 4.0.1.rc4, 3.1.12, 3.2.15.rc2, 3.2.17, 3.2.14, 3.1.9, 3.1.0.rc5, 3.1.0.rc3, 3.2.13, 4.1.2.rc3, 4.1.0, 4.0.6, 4.0.6.rc3, 4.0.4.rc1, 4.0.1.rc1, 4.1.2.rc2, 3.1.11, 3.2.0.rc1, 4.1.2, 4.0.6.rc1, 4.0.7, 4.1.2.rc1, 4.0.1.rc3, 4.1.4, 4.0.6.rc2, 3.2.15, 4.0.4, 4.0.0, 3.1.0.rc1, 3.2.16, 4.0.1.rc2, 3.0.19, 3.1.0.beta1, 3.1.0.rc2, 3.2.14.rc2, 4.0.3, 4.0.5, 4.0.8, 4.1.3, 3.1.0.rc8, 3.2.11, 4.1.8, 7.0.3, 5.2.6, 6.1.5, 6.1.4.7, 5.2.6.2, 6.1.4.6, 5.2.8, 6.0.4.8, 5.2.6.3, 7.0.2, 6.0.4.7, 7.0.1, 7.0.2.2, 7.0.2.4, 5.2.7.1, 6.0.4.6, 6.1.4.1, 6.1.6, 6.0.5, 6.1.5.1, 5.2.7, 7.0.2.3, 6.1.2, 5.1.2, 6.1.4.3, 4.2.11.3, 5.1.3, 5.0.1.rc1, 6.0.3.2, 4.2.10, 6.0.1, 6.0.0, 5.2.4.3, 6.1.4.2, 4.0.13, 3.2.22.3, 4.2.7.rc1, 5.1.4, 5.0.0.rc2, 6.0.3.6, 6.0.3.5, 4.1.14.rc2, 5.2.0.beta1, 4.1.15, 4.0.0.rc2, 5.1.0.rc2, 5.2.4.4, 6.1.2.1, 5.2.5, 4.1.0.rc1, 4.2.6, 3.2.19, 5.0.7.1, 3.2.22.4, 3.2.21, 6.0.2, 6.0.4, 6.0.1.rc1, 4.2.2, 5.2.4.1, 5.2.1.rc1, 5.1.5, 5.1.3.rc3, 3.2.20, 5.1.1, 5.2.6.1, 6.1.4, 7.0.2.1, 7.0.0, 6.0.2.2, 6.0.2.1, 6.1.3.2, 5.2.4.6, 5.2.4, 5.2.4.rc1, 5.2.4.5, 5.2.2.1, 5.2.0, 5.2.0.rc1, 5.1.6, 5.1.3.rc2, 5.1.0, 5.0.7.2, 5.0.6.rc1, 5.0.0.beta1, 4.2.5, 4.2.5.rc1, 5.0.3, 5.0.0.rc1, 4.2.10.rc1, 4.2.1.rc2, 4.1.13.rc1, 4.2.0.rc3, 4.1.15.rc1, 4.1.14.2, 4.1.14.1, 4.1.12.rc1, 4.1.11, 4.1.10, 4.1.10.rc3, 4.1.9, 4.0.13.rc1, 4.0.10.rc2, 4.0.10.rc1, 4.0.0.rc1, 5.0.1, 5.0.4, 3.2.22.5, 4.2.5.2, 4.2.0, 5.0.0.beta4, 5.0.0.beta3, 5.0.0.beta2, 4.2.0.beta4, 4.1.7, 4.0.11.1, 4.0.9, 3.2.22.2, 4.1.0.beta2, 4.2.9.rc1, 4.2.5.rc2, 4.1.10.rc1, 4.1.9.rc1, 4.1.6.rc1, 4.1.0.rc2, 4.0.12, 4.0.11, 6.1.3, 5.2.0.beta2, 6.0.3.1, 6.1.1, 6.0.2.rc2, 5.2.2, 5.2.2.rc1, 4.2.1.rc3, 5.1.3.rc1, 5.1.0.beta1, 5.0.4.rc1, 5.0.2.rc1, 5.0.0, 4.1.10.rc2, 4.2.0.rc2, 5.2.3, 4.2.0.beta1, 5.2.1, 6.0.4.2, 5.0.5.rc2, 5.0.2, 4.1.16.rc1, 5.0.0.1, 5.2.1.1, 6.1.4.5, 4.1.0.beta1, 4.2.0.rc1, 6.1.3.1, 6.0.4.4, 6.0.4.1, 6.0.3.7, 5.1.0.rc1, 5.0.1.rc2, 5.0.0.beta1.1, 4.2.11, 4.2.11.1, 4.2.7, 4.2.6.rc1, 4.2.4, 4.2.4.rc1, 4.2.9, 4.2.7.1, 4.2.3, 4.2.1, 4.2.1.rc4, 4.1.12, 4.0.10, 3.2.22.1, 4.1.7.1, 4.1.6.rc2, 4.1.14, 4.2.9.rc2, 5.1.2.rc1, 5.0.5, 5.0.5.rc1, 6.0.2.rc1, 5.1.7, 5.1.5.rc1, 5.0.7, 4.1.13, 4.2.8, 6.0.4.5, 6.1.4.4, 4.2.11.2, 5.0.0.racecar1, 4.1.5, 4.1.10.rc4, 4.2.1.rc1, 5.1.4.rc1, 5.1.6.1, 5.1.6.2, 5.1.7.rc1, 5.2.0.rc2, 5.2.3.rc1, 5.2.4.2, 6.0.3.rc1, 6.0.3.4, 6.1.0, 6.0.4.3, 3.2.22, 4.0.0.beta1, 4.1.6, 4.1.14.rc1, 4.1.16, 4.2.3.rc1, 4.2.5.1, 4.2.0.beta2, 4.2.0.beta3, 5.0.6, 4.2.8.rc1, 6.0.3, 6.0.3.3
(Show all)
|
Patch → 6.1.7.1 |
CVE-2021-22880 |
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input. |
6.1.2,
5.1.2,
5.1.3,
5.0.1.rc1,
6.0.3.2,
6.0.1,
6.0.0,
5.2.4.3
, 5.1.4, 5.2.0.beta1, 5.1.0.rc2, 5.2.4.4, 5.0.7.1, 6.0.2, 6.0.1.rc1, 5.2.4.1, 5.2.1.rc1, 5.1.5, 5.1.3.rc3, 5.1.1, 6.0.2.2, 6.0.2.1, 5.2.4, 5.2.4.rc1, 5.2.2.1, 5.2.0, 5.2.0.rc1, 5.1.6, 5.1.3.rc2, 5.1.0, 5.0.7.2, 5.0.6.rc1, 5.0.3, 5.0.1, 5.0.4, 5.2.0.beta2, 6.0.3.1, 6.1.1, 6.0.2.rc2, 5.2.2, 5.2.2.rc1, 5.1.3.rc1, 5.1.0.beta1, 5.0.4.rc1, 5.0.2.rc1, 5.0.0, 5.2.3, 5.2.1, 5.0.5.rc2, 5.0.2, 5.0.0.1, 5.2.1.1, 5.1.0.rc1, 5.0.1.rc2, 5.1.2.rc1, 5.0.5, 5.0.5.rc1, 6.0.2.rc1, 5.1.7, 5.1.5.rc1, 5.0.7, 5.1.4.rc1, 5.1.6.1, 5.1.6.2, 5.1.7.rc1, 5.2.0.rc2, 5.2.3.rc1, 5.2.4.2, 6.0.3.rc1, 6.0.3.4, 6.1.0, 5.0.6, 6.0.3, 6.0.3.3
(Show all)
|
Patch → 6.1.7.1 |
CVE-2016-6317 |
Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. |
4.2.7.rc1,
4.2.6,
4.2.2,
4.2.5,
4.2.5.rc1,
4.2.1.rc2,
4.2.5.2,
4.2.0
, 4.2.5.rc2, 4.2.1.rc3, 4.2.7, 4.2.6.rc1, 4.2.4, 4.2.4.rc1, 4.2.3, 4.2.1, 4.2.1.rc4, 4.2.1.rc1, 4.2.3.rc1, 4.2.5.1
(Show all)
|
Patch → 6.1.7.1 |
CVE-2015-7577 |
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature. |
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.2.3,
3.1.5.rc1,
3.2.7.rc1,
3.1.6
, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.2.9, 3.2.7, 3.2.8.rc2, 3.2.0, 3.1.2.rc2, 3.2.9.rc2, 3.2.1, 3.2.6, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 3.2.5, 3.1.1.rc3, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 4.1.1, 3.2.10, 3.2.13.rc2, 3.2.14.rc1, 3.2.13.rc1, 3.2.12, 3.1.10, 3.2.15.rc1, 4.0.1, 3.2.18, 3.2.15.rc3, 3.2.0.rc2, 4.0.2, 4.0.1.rc4, 3.1.12, 3.2.15.rc2, 3.2.17, 3.2.14, 3.1.9, 3.2.13, 4.1.2.rc3, 4.1.0, 4.0.6, 4.0.6.rc3, 4.0.4.rc1, 4.0.1.rc1, 4.1.2.rc2, 3.1.11, 3.2.0.rc1, 4.1.2, 4.0.6.rc1, 4.0.7, 4.1.2.rc1, 4.0.1.rc3, 4.1.4, 4.0.6.rc2, 3.2.15, 4.0.4, 4.0.0, 3.2.16, 4.0.1.rc2, 3.2.14.rc2, 4.0.3, 4.0.5, 4.0.8, 4.1.3, 3.2.11, 4.1.8, 4.0.13, 4.1.14.rc2, 4.1.0.rc1, 3.2.19, 3.2.21, 4.2.2, 3.2.20, 5.0.0.beta1, 4.2.5, 4.2.5.rc1, 4.2.1.rc2, 4.1.13.rc1, 4.1.12.rc1, 4.1.11, 4.1.10, 4.1.10.rc3, 4.1.9, 4.0.13.rc1, 4.0.10.rc2, 4.0.10.rc1, 4.2.0, 4.1.7, 4.0.11.1, 4.0.9, 4.1.0.beta2, 4.2.5.rc2, 4.1.10.rc1, 4.1.9.rc1, 4.1.6.rc1, 4.1.0.rc2, 4.0.12, 4.0.11, 4.2.1.rc3, 4.1.10.rc2, 4.1.0.beta1, 4.2.4, 4.2.4.rc1, 4.2.3, 4.2.1, 4.2.1.rc4, 4.1.12, 4.0.10, 4.1.7.1, 4.1.6.rc2, 4.1.14, 4.1.13, 4.1.5, 4.1.10.rc4, 4.2.1.rc1, 3.2.22, 4.1.6, 4.1.14.rc1, 4.2.3.rc1
(Show all)
|
Patch → 6.1.7.1 |
CVE-2014-3514 |
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls. |
4.1.1,
4.0.1,
4.0.2,
4.0.1.rc4,
4.1.2.rc3,
4.1.0,
4.0.6,
4.0.6.rc3
, 4.0.4.rc1, 4.0.1.rc1, 4.1.2.rc2, 4.1.2, 4.0.6.rc1, 4.0.7, 4.1.2.rc1, 4.0.1.rc3, 4.1.4, 4.0.6.rc2, 4.0.4, 4.0.0, 4.0.1.rc2, 4.0.3, 4.0.5, 4.0.8, 4.1.3
(Show all)
|
Patch → 6.1.7.1 |
CVE-2014-3483 |
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting. |
4.1.1,
4.0.1,
4.0.2,
4.0.1.rc4,
4.1.2.rc3,
4.1.0,
4.0.6,
4.0.6.rc3
, 4.0.4.rc1, 4.0.1.rc1, 4.1.2.rc2, 4.1.2, 4.0.6.rc1, 4.1.2.rc1, 4.0.1.rc3, 4.0.6.rc2, 4.0.4, 4.0.0, 4.0.1.rc2, 4.0.3, 4.0.5
(Show all)
|
Patch → 6.1.7.1 |
CVE-2014-3482 |
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting. |
3.0.12,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.0.2,
3.0.6.rc2
, 3.2.3, 3.0.11, 3.0.17, 2.3.10, 2.3.9.pre, 2.3.4, 2.3.5, 3.0.0.beta4, 2.3.18, 2.1.0, 3.1.5.rc1, 3.0.8, 3.0.10.rc1, 3.0.6, 3.0.0.beta2, 3.2.7.rc1, 3.1.6, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.16, 3.0.15, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.3.17, 2.0.5, 2.0.0, 3.2.9, 2.3.9, 3.2.7, 2.3.6, 3.0.0.beta, 3.2.8.rc2, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 3.0.8.rc4, 2.3.3, 3.0.0.rc, 3.2.9.rc2, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 3.2.6, 3.0.6.rc1, 2.2.2, 3.0.0.rc2, 3.0.0.beta3, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 3.0.14, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 3.2.5, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 2.3.11, 2.3.12, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.13, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 3.0.8.rc2, 2.3.15, 3.0.20, 3.2.10, 3.2.13.rc2, 3.2.14.rc1, 3.1.0.rc4, 3.2.13.rc1, 3.2.12, 3.1.10, 3.2.15.rc1, 3.1.0.rc6, 3.2.18, 3.2.15.rc3, 3.0.18, 3.2.0.rc2, 3.1.12, 3.2.15.rc2, 3.2.17, 3.2.14, 3.1.9, 3.1.0.rc5, 3.1.0.rc3, 3.2.13, 3.1.11, 3.2.0.rc1, 3.2.15, 3.1.0.rc1, 3.2.16, 3.0.19, 3.1.0.beta1, 3.1.0.rc2, 3.2.14.rc2, 3.1.0.rc8, 3.2.11
(Show all)
|
Patch → 6.1.7.1 |
CVE-2013-1854 |
The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method. |
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.2.3,
2.3.10,
2.3.9.pre,
2.3.4
, 2.3.5, 3.1.5.rc1, 3.2.7.rc1, 3.1.6, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 2.3.2, 2.3.17, 3.2.9, 2.3.9, 3.2.7, 2.3.6, 3.2.8.rc2, 3.2.0, 2.3.8, 2.3.14, 3.1.2.rc2, 2.3.3, 3.2.9.rc2, 3.2.1, 3.2.6, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 2.3.8.pre1, 3.2.5, 3.1.1.rc3, 2.3.7, 2.3.16, 2.3.11, 2.3.12, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 2.3.15, 3.2.10, 3.2.13.rc2, 3.2.13.rc1, 3.2.12, 3.1.10, 3.1.9, 3.1.11, 3.2.11
(Show all)
|
Patch → 6.1.7.1 |
CVE-2013-0277 |
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML. |
3.0.12,
1.14.4,
3.0.7.rc1,
3.0.2,
3.0.6.rc2,
3.0.11,
3.0.17,
2.3.10
, 2.3.9.pre, 2.3.4, 2.3.5, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.0.8, 1.3.0, 3.0.10.rc1, 3.0.6, 1.13.1, 1.12.1, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.16, 3.0.15, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 2.3.9, 2.3.6, 3.0.9, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 1.15.2, 1.14.0, 3.0.8.rc4, 2.3.3, 3.0.9.rc5, 3.0.8.rc1, 1.9.0, 1.5.0, 3.0.6.rc1, 2.2.2, 1.7.0, 3.0.14, 1.8.0, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 1.15.3, 1.5.1, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.13, 1.13.2, 3.0.8.rc2, 2.3.15, 3.0.20, 3.1.0.rc4, 3.1.0.rc6, 3.0.18, 3.1.0.rc5, 3.1.0.rc3, 3.1.0.rc1, 3.0.19, 3.1.0.beta1, 3.1.0.rc2, 3.1.0.rc8
(Show all)
|
Patch → 6.1.7.1 |
CVE-2013-0276 |
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection mechanism and modify protected model attributes via a crafted request. |
1.14.4,
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.2.3,
2.3.10,
2.3.9.pre
, 2.3.4, 2.3.5, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.1.5.rc1, 1.3.0, 3.2.7.rc1, 3.1.6, 1.13.1, 1.12.1, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 2.3.2, 2.1.2, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 3.2.9, 2.3.9, 3.2.7, 2.3.6, 3.2.8.rc2, 3.2.0, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 1.15.2, 1.14.0, 2.3.3, 3.2.9.rc2, 3.2.1, 3.2.6, 1.9.0, 1.5.0, 2.2.2, 1.7.0, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 1.8.0, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 3.2.5, 1.15.3, 1.5.1, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 2.1.1, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 1.13.2, 2.3.15, 3.2.10, 3.1.10, 3.1.9, 3.2.11
(Show all)
|
Patch → 6.1.7.1 |
CVE-2013-0155 |
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694. |
3.0.12,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.0.2,
3.0.6.rc2
, 3.2.3, 3.0.11, 3.0.17, 3.1.5.rc1, 3.0.8, 3.0.10.rc1, 3.0.6, 3.2.7.rc1, 3.1.6, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.16, 3.0.15, 3.0.3, 3.0.5.rc1, 3.0.4, 3.2.9, 3.2.7, 3.2.8.rc2, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 3.1.2.rc2, 3.0.8.rc4, 3.2.9.rc2, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 3.2.6, 3.0.6.rc1, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 3.0.14, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 3.2.5, 3.1.1.rc3, 3.0.0, 3.0.4.rc1, 3.0.13, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 3.0.8.rc2, 3.2.10, 3.0.18, 3.1.9
(Show all)
|
Patch → 6.1.7.1 |
CVE-2012-6496 |
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls. |
3.0.12,
1.14.4,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.1.7,
3.2.4,
3.0.2
, 3.0.6.rc2, 3.2.3, 3.0.11, 3.0.17, 2.3.10, 2.3.9.pre, 2.3.4, 2.3.5, 3.0.0.beta4, 2.3.18, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.1.5.rc1, 3.0.8, 1.3.0, 3.0.10.rc1, 3.0.6, 3.0.0.beta2, 3.2.7.rc1, 3.1.6, 1.13.1, 1.12.1, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.2.8.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.16, 3.0.15, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.3.17, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 3.2.9, 2.3.9, 3.2.7, 2.3.6, 3.0.0.beta, 3.2.8.rc2, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 1.15.2, 1.14.0, 3.0.8.rc4, 2.3.3, 3.0.0.rc, 3.2.9.rc2, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 3.2.6, 1.9.0, 1.5.0, 3.0.6.rc1, 2.2.2, 3.0.0.rc2, 3.0.0.beta3, 1.7.0, 3.2.3.rc1, 3.2.9.rc3, 3.2.9.rc1, 3.0.14, 1.8.0, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 3.2.5, 1.15.3, 1.5.1, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.13, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 3.1.8, 3.2.8, 1.13.2, 3.0.8.rc2, 2.3.15
(Show all)
|
Patch → 6.1.7.1 |
CVE-2012-2695 |
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661. |
3.0.12,
1.14.4,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.2.4,
3.0.2,
3.0.6.rc2
, 3.2.3, 3.0.11, 2.3.10, 2.3.9.pre, 2.3.4, 2.3.5, 3.0.0.beta4, 2.3.18, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.1.5.rc1, 3.0.8, 1.3.0, 3.0.10.rc1, 3.0.6, 3.0.0.beta2, 1.13.1, 1.12.1, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.3.17, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 2.3.9, 2.3.6, 3.0.0.beta, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 1.15.2, 1.14.0, 3.0.8.rc4, 2.3.3, 3.0.0.rc, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 1.9.0, 1.5.0, 3.0.6.rc1, 2.2.2, 3.0.0.rc2, 3.0.0.beta3, 1.7.0, 3.2.3.rc1, 1.8.0, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 3.2.5, 1.15.3, 1.5.1, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.13, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.1.5, 1.13.2, 3.0.8.rc2, 2.3.15
(Show all)
|
Patch → 6.1.7.1 |
CVE-2012-2661 |
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695. |
3.0.12,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.0.2,
3.0.6.rc2,
3.2.3,
3.0.11
, 3.1.5.rc1, 3.0.8, 3.0.10.rc1, 3.0.6, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.3, 3.0.5.rc1, 3.0.4, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 3.1.2.rc2, 3.0.8.rc4, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 3.0.6.rc1, 3.2.3.rc1, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 3.1.1.rc3, 3.0.0, 3.0.4.rc1, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 3.0.8.rc2
(Show all)
|
Patch → 6.1.7.1 |
CVE-2012-2660 |
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694. |
3.0.12,
1.14.4,
3.0.7.rc1,
3.2.4.rc1,
3.1.4.rc1,
3.0.2,
3.0.6.rc2,
3.2.3
, 3.0.11, 2.3.10, 2.3.9.pre, 2.3.4, 2.3.5, 3.0.0.beta4, 2.3.18, 2.1.0, 1.14.2, 1.9.1, 1.13.0, 1.15.6, 3.1.5.rc1, 3.0.8, 1.3.0, 3.0.10.rc1, 3.0.6, 3.0.0.beta2, 1.13.1, 1.12.1, 3.2.2, 3.1.4, 3.2.3.rc2, 3.2.2.rc1, 3.1.3, 3.1.1, 3.1.1.rc1, 3.1.0, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.3.17, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 2.3.9, 2.3.6, 3.0.0.beta, 3.0.9, 3.2.0, 3.0.12.rc1, 3.0.9.rc4, 3.0.7.rc2, 3.0.10, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 2.3.8, 2.3.14, 3.1.2.rc2, 1.15.2, 1.14.0, 3.0.8.rc4, 2.3.3, 3.0.0.rc, 3.0.9.rc5, 3.0.8.rc1, 3.2.1, 1.9.0, 1.5.0, 3.0.6.rc1, 2.2.2, 3.0.0.rc2, 3.0.0.beta3, 1.7.0, 3.2.3.rc1, 1.8.0, 3.0.9.rc1, 3.0.1, 3.0.13.rc1, 2.3.8.pre1, 2.2.3, 1.4.0, 1.0.0, 1.15.3, 1.5.1, 3.1.1.rc3, 2.3.7, 2.3.16, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 2.3.11, 2.3.12, 1.14.3, 1.10.0, 3.0.0, 2.1.1, 3.0.4.rc1, 3.1.1.rc2, 3.1.2.rc1, 3.1.2, 1.13.2, 3.0.8.rc2, 2.3.15
(Show all)
|
Patch → 6.1.7.1 |
CVE-2011-2930 |
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name. |
3.0.7.rc1,
3.0.2,
3.0.6.rc2,
2.3.10,
2.3.9.pre,
2.3.4,
2.3.5,
2.1.0
, 3.0.8, 3.0.10.rc1, 3.0.6, 3.0.9.rc3, 3.0.7, 3.0.5, 3.0.3, 3.0.5.rc1, 3.0.4, 2.3.2, 2.1.2, 2.0.5, 2.0.0, 2.3.9, 2.3.6, 3.0.9, 3.0.9.rc4, 3.0.7.rc2, 2.0.1, 2.0.2, 2.3.8, 3.0.8.rc4, 2.3.3, 3.0.9.rc5, 3.0.8.rc1, 3.0.6.rc1, 2.2.2, 3.0.9.rc1, 3.0.1, 2.3.8.pre1, 2.2.3, 2.3.7, 2.0.4, 2.3.11, 2.3.12, 3.0.0, 2.1.1, 3.0.4.rc1, 3.0.8.rc2
(Show all)
|
Patch → 6.1.7.1 |
CVE-2011-0448 |
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument. |
3.0.2,
3.0.3,
3.0.1,
3.0.0,
3.0.4.rc1
|
Patch → 6.1.7.1 |
CVE-2010-3933 |
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs. |
2.3.9,
3.0.0
|
Patch → 6.1.7.1 |
CVE-2008-4094 |
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer. |
1.14.4,
2.1.0,
1.14.2,
1.9.1,
1.13.0,
1.15.6,
1.3.0,
1.13.1
, 1.12.1, 2.0.5, 1.15.5, 2.0.0, 1.15.1, 1.1.0, 2.0.1, 1.15.4, 1.15.0, 1.10.1, 1.2.0, 2.0.2, 1.15.2, 1.14.0, 1.9.0, 1.5.0, 1.7.0, 1.8.0, 1.4.0, 1.0.0, 1.15.3, 1.5.1, 2.0.4, 1.11.0, 1.14.1, 1.12.2, 1.11.1, 1.6.0, 1.14.3, 1.10.0, 1.13.2
(Show all)
|
Patch → 6.1.7.1 |