Revision Date: | 2013-01-03 | Version: | 1 | Title: | CVE-2012-6496 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2012-6496
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT rails package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-actionmailer package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-actionpack package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-actionview package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activejob package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activemodel package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activerecord package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activesupport package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-rails package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-railties package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
|
|