| 0 |
| url |
VCID-1rxp-g9rz-4yb3 |
| vulnerability_id |
VCID-1rxp-g9rz-4yb3 |
| summary |
Possible XSS Security Vulnerability in SafeBuffer#bytesplice
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
This vulnerability has been assigned the CVE identifier CVE-2023-28120.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.4.3, 6.1.7.3
# Impact
ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized.
When these strings are mutated, the tag is should be removed to mark them as no longer being html_safe.
Ruby 3.2 introduced a new bytesplice method which ActiveSupport does not yet understand to be a mutation.
Users on older versions of Ruby are likely unaffected.
All users running an affected release and using bytesplice should either upgrade or use one of the workarounds immediately.
# Workarounds
Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60394 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60323 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60349 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60317 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60366 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60403 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60389 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60411 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60419 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28120 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28120, GHSA-pj73-v5mw-pm9j, GMS-2023-765
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1rxp-g9rz-4yb3 |
|
| 1 |
| url |
VCID-3zdr-vasc-a7cn |
| vulnerability_id |
VCID-3zdr-vasc-a7cn |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3009 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81962 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81837 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81848 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.8187 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81866 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81919 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81902 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81937 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81938 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81939 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3009 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3009, GHSA-8qrh-h9m2-5fvf, OSV-57666
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3zdr-vasc-a7cn |
|
| 2 |
| url |
VCID-43f3-rxwm-fkgv |
| vulnerability_id |
VCID-43f3-rxwm-fkgv |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74327 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74295 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74303 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74208 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74293 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74263 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74282 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7426 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74213 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2932 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2932, GHSA-9fh3-vh3h-q4g3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-43f3-rxwm-fkgv |
|
| 3 |
| url |
VCID-4tzv-1t1b-t3g3 |
| vulnerability_id |
VCID-4tzv-1t1b-t3g3 |
| summary |
Rails Active Support has a possible ReDoS vulnerability in number_to_delimited
### Impact
`NumberToDelimitedConverter` used a regular expression with `gsub!` to insert thousands delimiters. This could produce quadratic time complexity on long digit strings.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04803 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04855 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04874 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04894 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04858 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0484 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0558 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33169, GHSA-cg4j-q9v8-6v38
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4tzv-1t1b-t3g3 |
|
| 4 |
| url |
VCID-5tky-d2en-u7c7 |
| vulnerability_id |
VCID-5tky-d2en-u7c7 |
| summary |
Rails Active Support has a possible XSS vulnerability in SafeBuffer#%
### Impact
`SafeBuffer#%` does not propagate the `@html_unsafe` flag to the newly created buffer. If a `SafeBuffer` is mutated in place (e.g. via `gsub!`) and then formatted with `%` using untrusted arguments, the result incorrectly reports `html_safe? == true`, bypassing ERB auto-escaping and possibly leading to XSS.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02255 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02169 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02201 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.022 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02804 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33170 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33170, GHSA-89vf-4333-qx8v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5tky-d2en-u7c7 |
|
| 5 |
| url |
VCID-6ku5-mtgz-zygw |
| vulnerability_id |
VCID-6ku5-mtgz-zygw |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81049 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81071 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82473 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82454 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82406 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.825 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82448 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.8242 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22796 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22796, GHSA-j6gc-792m-qgm2, GMS-2023-61
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ku5-mtgz-zygw |
|
| 6 |
| url |
VCID-6r5v-h4kr-zqen |
| vulnerability_id |
VCID-6r5v-h4kr-zqen |
| summary |
Moderate severity vulnerability that affects activesupport
Withdrawn, accidental duplicate publish.
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-35c4-f3rq-f9g3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6r5v-h4kr-zqen |
|
| 7 |
| url |
VCID-7f5r-9h1g-nuch |
| vulnerability_id |
VCID-7f5r-9h1g-nuch |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68222 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68179 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68185 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68147 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.6818 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68102 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68125 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68084 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68107 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3086 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3086, GHSA-fg9w-g6m4-557j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f5r-9h1g-nuch |
|
| 8 |
| url |
VCID-ed3f-3bxh-eba4 |
| vulnerability_id |
VCID-ed3f-3bxh-eba4 |
| summary |
activesupport vulnerable to Denial of Service via large XML document depth
The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 3.2.22, 4.1.x before 4.1.11, and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85887 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85807 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85841 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85856 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85853 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85873 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85865 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85776 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85789 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3227 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3227, GHSA-j96r-xvjq-r9pg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ed3f-3bxh-eba4 |
|
| 9 |
| url |
VCID-j24x-nhsb-yug6 |
| vulnerability_id |
VCID-j24x-nhsb-yug6 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6332 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63301 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63314 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63295 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6333 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63313 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6319 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63249 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2197, GHSA-v9v4-7jp6-8c73
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j24x-nhsb-yug6 |
|
| 10 |
| url |
VCID-sarm-n22v-akcm |
| vulnerability_id |
VCID-sarm-n22v-akcm |
| summary |
Rails Active Support has a possible DoS vulnerability in its number helpers
### Impact
Active Support number helpers accept strings containing scientific notation (e.g. `1e10000`), which when converted to a string could be expanded into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33176 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05813 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05699 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05712 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05706 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05668 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05678 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06323 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33176 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33176, GHSA-2j26-frm8-cmj9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sarm-n22v-akcm |
|
| 11 |
| url |
VCID-t2cx-7ycd-tqhq |
| vulnerability_id |
VCID-t2cx-7ycd-tqhq |
| summary |
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43622 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43674 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43725 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43748 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43699 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43761 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43752 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43684 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.4366 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43716 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43741 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3226 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3226, GHSA-vxvp-4xwc-jpp6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2cx-7ycd-tqhq |
|