First published: Mon Aug 14 2006(Updated: )
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Ruby On Rails | =0.8.0 | |
Rubyonrails Ruby On Rails | =0.5.7 | |
Rubyonrails Ruby On Rails | =0.7.0 | |
Rubyonrails Ruby On Rails | <=1.1.4 | |
Rubyonrails Ruby On Rails | =0.8.5 | |
Rubyonrails Ruby On Rails | =0.6.0 | |
Rubyonrails Ruby On Rails | =0.5.6 | |
Rubyonrails Ruby On Rails | =0.9.0 | |
Rubyonrails Ruby On Rails | =0.5.5 | |
Rubyonrails Ruby On Rails | =0.5.0 | |
Rubyonrails Ruby On Rails | =0.6.5 | |
Rubyonrails Rails | =0.9.1 | |
Rubyonrails Rails | =0.9.2 | |
Rubyonrails Rails | =0.9.3 | |
Rubyonrails Rails | =0.9.4 | |
Rubyonrails Rails | =0.9.4.1 | |
Rubyonrails Rails | =0.10.0 | |
Rubyonrails Rails | =0.10.1 | |
Rubyonrails Rails | =0.11.0 | |
Rubyonrails Rails | =0.11.1 | |
Rubyonrails Rails | =0.12.0 | |
Rubyonrails Rails | =0.12.1 | |
Rubyonrails Rails | =0.13.0 | |
Rubyonrails Rails | =0.13.1 | |
Rubyonrails Rails | =0.14.1 | |
Rubyonrails Rails | =0.14.2 | |
Rubyonrails Rails | =0.14.3 | |
Rubyonrails Rails | =0.14.4 | |
Rubyonrails Rails | =1.0.0 | |
Rubyonrails Rails | =1.1.1 | |
Rubyonrails Rails | =1.1.2 | |
Rubyonrails Rails | =1.1.3 | |
Rubyonrails Rails | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.