Sha256: ec9ce13b0c212ae2dd80775f862654d8b776852fc9a21f022fb351b3a5e34796
Contents?: true
Size: 819 Bytes
Versions: 1
Compression:
Stored size: 819 Bytes
Contents
--- gem: actionpack framework: rails cve: 2012-1099 osvdb: 79727 url: https://nvd.nist.gov/vuln/detail/CVE-2012-1099 title: Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb Manually Generated Select Tag Options XSS date: 2012-03-01 description: | Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate manually generated 'select tag options' upon submission to actionpack/lib/action_view/helpers/form_options_helper.rb. This may allow a user to create a specially crafted request that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. cvss_v2: 4.3 patched_versions: - ~> 3.0.12 - ~> 3.1.4 - ">= 3.2.2"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/actionpack/CVE-2012-1099.yml |