This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.
This page will reflect the classification results once they are available through NVD.
Any vendor information available is shown as below.
actionpack: Possible XSS via User Supplied Values to redirect_to
Name | Vendor | Version |
---|---|---|
Red Hat Satellite 6.14 for RHEL 8 | RedHat | rubygem-actionpack-0:6.1.7.4-1.el8sat |
[Unknown description]
Name | Vendor | Version |
---|---|---|
Ruby-rails-3.2 | Ubuntu/upstream | TBD |
Ruby-rails-3.2 | Ubuntu/trusty | end of standard support |
Rails | Ubuntu/focal | TBD |
Rails | Ubuntu/jammy | TBD |
Rails | Ubuntu/kinetic | end of life, was needs-triage |
Rails | Ubuntu/lunar | end of life, was needs-triage |
Rails | Ubuntu/oracular | TBD |
Rails | Ubuntu/esm-apps/bionic | TBD |
Rails | Ubuntu/esm-apps/noble | TBD |
Rails | Ubuntu/esm-apps/xenial | TBD |
Rails | Ubuntu/devel | TBD |
Rails | Ubuntu/esm-apps/focal | TBD |
Rails | Ubuntu/esm-apps/jammy | TBD |
Rails | Ubuntu/mantic | end of life, was needs-triage |
Rails | Ubuntu/noble | TBD |
Rails | Ubuntu/trusty | end of standard support |
Rails | Ubuntu/upstream | TBD |
Rails | Ubuntu/bionic | end of standard support |
Rails | Ubuntu/xenial | end of standard support |
Rails-4.0 | Ubuntu/trusty | end of standard support |
Rails-4.0 | Ubuntu/upstream | TBD |
Ruby-actionpack-3.2 | Ubuntu/upstream | TBD |
Ruby-actionpack-3.2 | Ubuntu/trusty | end of standard support |
Ruby-activemodel-3.2 | Ubuntu/trusty | end of standard support |
Ruby-activemodel-3.2 | Ubuntu/upstream | TBD |
Ruby-activerecord-3.2 | Ubuntu/trusty | end of standard support |
Ruby-activerecord-3.2 | Ubuntu/upstream | TBD |
Ruby-activesupport-3.2 | Ubuntu/trusty | end of standard support |
Ruby-activesupport-3.2 | Ubuntu/upstream | TBD |