rpm package
suse/rubygem-activemodel-4_2&distro=SUSE OpenStack Cloud 7
pkg:rpm/suse/rubygem-activemodel-4_2&distro=SUSE%20OpenStack%20Cloud%207
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-6317 | Hig | 7.5 | < 4.2.9-6.3.1 | 4.2.9-6.3.1 | Sep 7, 2016 | Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks o | |
| CVE-2016-6316 | Med | 6.1 | < 4.2.9-6.3.1 | 4.2.9-6.3.1 | Sep 7, 2016 | Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handle | |
| CVE-2016-2098 | Hig | 7.3 | < 4.2.9-6.3.1 | 4.2.9-6.3.1 | Apr 7, 2016 | Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. |
- affected < 4.2.9-6.3.1fixed 4.2.9-6.3.1
Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks o
- affected < 4.2.9-6.3.1fixed 4.2.9-6.3.1
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handle
- affected < 4.2.9-6.3.1fixed 4.2.9-6.3.1
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.