Page 7 of 31 results (0.003 seconds)

CVSS: 7.5EPSS: 2%CPEs: 33EXPL: 0

Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112. Ruby on Rails anterior a 1.1.5 permite a un atacante remoto ejecutar código Ruby con un impacto "severo" o "serio" a través de una respuesta File Upload con una cabecera HTTP que modifica la variable LOAD_PATH, una vulnerabilidad diferente que CVE-2006-4112. • http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html http://secunia.com/advisories/21466 http://secunia.com/advisories/21749 http://securitytracker.com/id?1016673 http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml http://www.novell.com/linux/security/advisories/2006_21_sr.html http://www.securityfocus.com/bid/19454 http://www.vupen.com/english/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •