Vulnerability Details CVE-2008-4094
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.029
EPSS Ranking 85.7%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2008-4094
-
cpe:2.3:a:rubyonrails:rails:0.10.0
-
cpe:2.3:a:rubyonrails:rails:0.10.1
-
cpe:2.3:a:rubyonrails:rails:0.11.0
-
cpe:2.3:a:rubyonrails:rails:0.11.1
-
cpe:2.3:a:rubyonrails:rails:0.12.0
-
cpe:2.3:a:rubyonrails:rails:0.12.1
-
cpe:2.3:a:rubyonrails:rails:0.13.0
-
cpe:2.3:a:rubyonrails:rails:0.13.1
-
cpe:2.3:a:rubyonrails:rails:0.14.1
-
cpe:2.3:a:rubyonrails:rails:0.14.2
-
cpe:2.3:a:rubyonrails:rails:0.14.3
-
cpe:2.3:a:rubyonrails:rails:0.14.4
-
cpe:2.3:a:rubyonrails:rails:0.9.1
-
cpe:2.3:a:rubyonrails:rails:0.9.2
-
cpe:2.3:a:rubyonrails:rails:0.9.3
-
cpe:2.3:a:rubyonrails:rails:0.9.4
-
cpe:2.3:a:rubyonrails:rails:0.9.4.1
-
cpe:2.3:a:rubyonrails:rails:1.0.0
-
cpe:2.3:a:rubyonrails:rails:1.1.0
-
cpe:2.3:a:rubyonrails:rails:1.1.1
-
cpe:2.3:a:rubyonrails:rails:1.1.2
-
cpe:2.3:a:rubyonrails:rails:1.1.3
-
cpe:2.3:a:rubyonrails:rails:1.1.4
-
cpe:2.3:a:rubyonrails:rails:1.1.5
-
cpe:2.3:a:rubyonrails:rails:1.1.6
-
cpe:2.3:a:rubyonrails:rails:1.2.0
-
cpe:2.3:a:rubyonrails:rails:1.2.1
-
cpe:2.3:a:rubyonrails:rails:1.2.2
-
cpe:2.3:a:rubyonrails:rails:1.2.3
-
cpe:2.3:a:rubyonrails:rails:1.2.4
-
cpe:2.3:a:rubyonrails:rails:1.2.5
-
cpe:2.3:a:rubyonrails:rails:1.2.6
-
cpe:2.3:a:rubyonrails:rails:1.9.5
-
cpe:2.3:a:rubyonrails:rails:2.0.0
-
cpe:2.3:a:rubyonrails:rails:2.0.1
-
cpe:2.3:a:rubyonrails:rails:2.0.2
-
cpe:2.3:a:rubyonrails:rails:2.0.4
-
cpe:2.3:a:rubyonrails:rails:2.1.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.10.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.10.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.11.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.11.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.12.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.12.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.13.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.13.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.14.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.14.2
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.14.3
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.14.4
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.5
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.6
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.5.7
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.6.5
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.7.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.8.5
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.2
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.3
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.4
-
cpe:2.3:a:rubyonrails:ruby_on_rails:0.9.4.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.0.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.2
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.3
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.4
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.5
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.1.6
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.2
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.3
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.4
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.5
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.2.6
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.9.3
-
cpe:2.3:a:rubyonrails:ruby_on_rails:1.9.5
-
cpe:2.3:a:rubyonrails:ruby_on_rails:2.0.0
-
cpe:2.3:a:rubyonrails:ruby_on_rails:2.0.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:2.0.2
-
cpe:2.3:a:rubyonrails:ruby_on_rails:2.0.4
-
cpe:2.3:a:rubyonrails:ruby_on_rails:2.1
-
cpe:2.3:a:rubyonrails:ruby_on_rails:2.1.0