Versio.io

CVE-2016-0753

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 25-01-2016 01:00
Last modified: - 25-01-2016 01:00
Total changes: - 11

Description

CVE-2016-0753 rubygem-activemodel, rubygem-activerecord: possible input validation circumvention in Active Model

Common Vulnerability Scoring System (CVSS)

AV:N/AC:M/Au:N/C:N/I:P/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
None
Confidentiality
Low
Integrity
-
Privileges required
-
Scope
-
User interaction
4.3
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=rh-ror41-rubygem-actionpack-1 AND versionEndExcluding=4.1.5-3.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionview-0 AND versionEndExcluding=4.1.5-4.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activemodel-0 AND versionEndExcluding=4.1.5-2.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activerecord-1 AND versionEndExcluding=4.1.5-2.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activesupport-1 AND versionEndExcluding=4.1.5-3.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionpack-1 AND versionEndExcluding=4.1.5-3.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionview-0 AND versionEndExcluding=4.1.5-4.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activemodel-0 AND versionEndExcluding=4.1.5-2.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activerecord-1 AND versionEndExcluding=4.1.5-2.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activesupport-1 AND versionEndExcluding=4.1.5-3.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionpack-1 AND versionEndExcluding=4.1.5-3.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionview-0 AND versionEndExcluding=4.1.5-4.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activemodel-0 AND versionEndExcluding=4.1.5-2.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activerecord-1 AND versionEndExcluding=4.1.5-2.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activesupport-1 AND versionEndExcluding=4.1.5-3.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionpack-1 AND versionEndExcluding=4.1.5-3.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionview-0 AND versionEndExcluding=4.1.5-4.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activemodel-0 AND versionEndExcluding=4.1.5-2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activerecord-1 AND versionEndExcluding=4.1.5-2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activesupport-1 AND versionEndExcluding=4.1.5-3.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionpack-1 AND versionEndExcluding=4.1.5-3.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionview-0 AND versionEndExcluding=4.1.5-4.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activemodel-0 AND versionEndExcluding=4.1.5-2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activerecord-1 AND versionEndExcluding=4.1.5-2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activesupport-1 AND versionEndExcluding=4.1.5-3.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionpack-1 AND versionEndExcluding=4.1.5-3.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-actionview-0 AND versionEndExcluding=4.1.5-4.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activemodel-0 AND versionEndExcluding=4.1.5-2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activerecord-1 AND versionEndExcluding=4.1.5-2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
AND
product=rh-ror41-rubygem-activesupport-1 AND versionEndExcluding=4.1.5-3.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=2
 

Reference

 


Keywords

REDHAT

 

CVE-2016-0753

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.