Sha256: 72636572c0adb69007a0f6062f6d75ee8dd49867332230e078117024063675f4
Contents?: true
Size: 711 Bytes
Versions: 1
Compression:
Stored size: 711 Bytes
Contents
--- gem: activerecord framework: rails cve: 2012-2661 osvdb: 82403 url: https://nvd.nist.gov/vuln/detail/CVE-2012-2661 title: Ruby on Rails where Method ActiveRecord Class SQL Injection date: 2012-05-31 description: | Ruby on Rails (RoR) contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the ActiveRecord class not properly sanitizing user-supplied input to the 'where' method. This may allow an attacker to inject or manipulate SQL queries in an application built on RoR, allowing for the manipulation or disclosure of arbitrary data. cvss_v2: 5.0 unaffected_versions: - ~> 2.3.14 patched_versions: - ~> 3.0.13 - ~> 3.1.5 - ">= 3.2.4"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/activerecord/CVE-2012-2661.yml |