Description
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0619 | The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string. |
Github GHSA |
GHSA-f93j-hmcr-jcwh | Moped Rubygem Data Injection Vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T06:11:13.071Z
Reserved: 2015-06-06T00:00:00.000Z
Link: CVE-2015-4410
No data.
Status : Modified
Published: 2020-02-20T17:15:12.587
Modified: 2024-11-21T02:31:00.730
Link: CVE-2015-4410
OpenCVE Enrichment
No data.
EUVD
Github GHSA