4.3
CVE-2015-3226
- EPSS 0.21%
- Veröffentlicht 26.07.2015 22:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rubyonrails ≫ Rails Version3.0.0
Rubyonrails ≫ Rails Version3.1.0
Rubyonrails ≫ Rails Version3.2.0
Rubyonrails ≫ Rails Version3.2.1
Rubyonrails ≫ Rails Version3.2.2
Rubyonrails ≫ Rails Version3.2.3
Rubyonrails ≫ Rails Version3.2.4
Rubyonrails ≫ Rails Version3.2.5
Rubyonrails ≫ Rails Version3.2.6
Rubyonrails ≫ Rails Version3.2.7
Rubyonrails ≫ Rails Version3.2.8
Rubyonrails ≫ Rails Version3.2.9
Rubyonrails ≫ Rails Version3.2.10
Rubyonrails ≫ Rails Version3.2.11
Rubyonrails ≫ Rails Version3.2.12
Rubyonrails ≫ Rails Version3.2.13
Rubyonrails ≫ Rails Version3.2.15
Rubyonrails ≫ Rails Version3.2.16
Rubyonrails ≫ Rails Version3.2.17
Rubyonrails ≫ Rails Version4.1.0
Rubyonrails ≫ Rails Version4.1.1
Rubyonrails ≫ Rails Version4.1.2
Rubyonrails ≫ Rails Version4.1.3
Rubyonrails ≫ Rails Version4.1.4
Rubyonrails ≫ Rails Version4.1.5
Rubyonrails ≫ Rails Version4.1.6
Rubyonrails ≫ Rails Version4.1.7
Rubyonrails ≫ Rails Version4.1.8
Rubyonrails ≫ Rails Version4.2.0
Rubyonrails ≫ Rails Version4.2.1
Rubyonrails ≫ Ruby On Rails Version3.2.14
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.438 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.