File tree Expand file tree Collapse file tree 9 files changed +39
-1
lines changed
Expand file tree Collapse file tree 9 files changed +39
-1
lines changed Original file line number Diff line number Diff line change 11---
22gem : actiontext
3+ framework : rails
34cve : 2024-34341
45ghsa : qjqp-xr96-cj99
56url : https://github.com/advisories/GHSA-qjqp-xr96-cj99
@@ -54,12 +55,12 @@ description: |
5455 can significantly mitigate the risk of such vulnerabilities.
5556 Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin
5657 are executed, and explicitly prohibit inline scripts using script-src-elem.
58+ cvss_v3 : 5.4
5759unaffected_versions :
5860 - " < 7.0.0"
5961patched_versions :
6062 - " ~> 7.0.8, >= 7.0.8.3"
6163 - " >= 7.1.3.3"
62- cvss_v3 : 5.4
6364related :
6465 url :
6566 - https://discuss.rubyonrails.org/t/xss-vulnerabilities-in-trix-editor/85803
Original file line number Diff line number Diff line change 11---
22gem : activestorage
3+ framework : rails
34cve : 2025-24293
45ghsa : r4mg-4433-c7g3
56url : https://github.com/rails/rails/security/advisories/GHSA-r4mg-4433-c7g3
Original file line number Diff line number Diff line change 11---
22gem : jquery-rails
3+ framework : rails
34cve : 2011-4969
45ghsa : 579v-mp3v-rrw5
56url : http://blog.jquery.com/2011/09/01/jquery-1-6-3-released
Original file line number Diff line number Diff line change 11---
22gem : jquery-rails
3+ framework : rails
34cve : 2015-1840
45ghsa : 4whc-pp4x-9pf3
56url : https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY
Original file line number Diff line number Diff line change 11---
22gem : jquery-rails
3+ framework : rails
34cve : 2016-10707
45ghsa : mhpp-875w-9cpv
56url : https://nvd.nist.gov/vuln/detail/CVE-2016-10707
Original file line number Diff line number Diff line change 11---
22gem : jquery-rails
3+ framework : rails
34cve : 2020-11022
45ghsa : gxr4-xjj5-5px2
56url : https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
Original file line number Diff line number Diff line change 11---
22gem : jquery-rails
3+ framework : rails
34cve : 2020-7656
45ghsa : q4m3-2j7h-f7xw
56url : https://snyk.io/vuln/SNYK-JS-JQUERY-569619
Original file line number Diff line number Diff line change 1+ ---
2+ gem : openc3
3+ cve : 2025-68271
4+ ghsa : w757-4qv9-mghp
5+ url : https://github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
6+ title : openc3-api Vulnerable to Unauthenticated Remote Code Execution
7+ date : 2026-01-13
8+ description : |
9+ ### Summary
10+
11+ OpenC3 COSMOS contains a critical remote code execution vulnerability
12+ reachable through the JSON-RPC API. When a JSON-RPC request uses the
13+ string form of certain APIs, attacker-controlled parameter text is
14+ parsed into values using String#convert_to_value. For array-like
15+ inputs, convert_to_value executes eval().
16+
17+ Because the cmd code path parses the command string before calling
18+ authorize(), an unauthenticated attacker can trigger Ruby code
19+ execution even though the request ultimately fails authorization (401).
20+ cvss_v3 : 10.0
21+ unaffected_versions :
22+ - " < 5.0.6"
23+ patched_versions :
24+ - " >= 6.10.2"
25+ related :
26+ url :
27+ - https://nvd.nist.gov/vuln/detail/CVE-2025-68271
28+ - https://github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
29+ - https://github.com/OpenC3/cosmos/commit/01e9fbc5e66e9a2500b71a75a44775dd1fc2d1de
30+ - https://github.com/advisories/GHSA-w757-4qv9-mghp
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ description: |
1313 attackers to execute arbitrary shell commands on the server without
1414 authentication.
1515cvss_v2 : 9.0
16+ cvss_v3 : 9.8
1617patched_versions :
1718 - " >= 0.60.2"
1819related :
You can’t perform that action at this time.
0 commit comments