A vulnerability was found in Nokogiri up to 1.12.4 on Ruby (Ruby Gem). It has been rated as critical. This issue affects the function Nokogiri::XML::SAX::Parse/Nokogiri::HTML4::SAX::Parser/its alias Nokogiri::HTML::SAX::Parser/Nokogiri::XML::SAX::PushParser/Nokogiri::HTML4::SAX::PushParser/Nokogiri::HTML::SAX::PushParser
of the component SAX Parser. Upgrading to version 1.12.5 eliminates this vulnerability. Applying the patch 5bf729ff3cc84709ee3c3248c981584088bf9f6d is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Nokogiri up to 1.12.4 on Ruby SAX Parser PushParser xml external entity reference
CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY
Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to
CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY
Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with
CVE-2024-51466 : IBM COGNOS ANALYTICS UP TO 11.2.4 FP4/12.0.4 EL EXPRESSION LANGUAGE INJECTION
Description IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4 is vulnerable to an Expression Language (EL) Injection
Cloud WAF is proudly powered by WordPress