| 0 |
| url |
VCID-1xgz-hwng-n3eq |
| vulnerability_id |
VCID-1xgz-hwng-n3eq |
| summary |
Untrusted users can run pending migrations in production in Rails
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production)
Fixed Versions: rails >= 6.0.3.2
Impact
------
Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already run.
Workarounds
-----------
Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb:
`config.middleware.delete ActionDispatch::ActionableExceptions` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71592 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71509 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71515 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71532 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.7158 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71564 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71546 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8185 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:gem/actionpack@6.0.3.2 |
| purl |
pkg:gem/actionpack@6.0.3.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12x8-jxdf-jqdz |
|
| 1 |
| vulnerability |
VCID-1bxs-yghe-cyck |
|
| 2 |
| vulnerability |
VCID-1x8k-t8mr-3fgp |
|
| 3 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 4 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 5 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 6 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 7 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 8 |
| vulnerability |
VCID-gjey-bqtd-kqa1 |
|
| 9 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 10 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 11 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 12 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-wg3a-j2dp-ayh4 |
|
| 16 |
| vulnerability |
VCID-wyy6-h8bq-vyde |
|
| 17 |
| vulnerability |
VCID-zy7d-3db6-sydw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.0.3.2 |
|
|
| aliases |
CVE-2020-8185, GHSA-c6qr-h5vq-59jc
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xgz-hwng-n3eq |
|
| 1 |
| url |
VCID-3zdr-vasc-a7cn |
| vulnerability_id |
VCID-3zdr-vasc-a7cn |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3009 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81937 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81837 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81848 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.8187 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81866 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81919 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81902 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3009 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3009, GHSA-8qrh-h9m2-5fvf, OSV-57666
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3zdr-vasc-a7cn |
|
| 2 |
| url |
VCID-49pq-vg95-jkh2 |
| vulnerability_id |
VCID-49pq-vg95-jkh2 |
| summary |
Cross-Site Request Forgery (CSRF)
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0447 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76879 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76868 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76837 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76857 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76822 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76922 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.7688 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76886 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00991 |
| scoring_system |
epss |
| scoring_elements |
0.76828 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0447 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0447, GHSA-24fg-p96v-hxh8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-49pq-vg95-jkh2 |
|
| 3 |
| url |
VCID-63gy-6njy-kbd8 |
| vulnerability_id |
VCID-63gy-6njy-kbd8 |
| summary |
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted `X_FORWARDED_HOST` header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22792 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85729 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85707 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85711 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85701 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85689 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.8567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85663 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22792 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22792, GHSA-p84v-45xj-wwqj, GMS-2023-58
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-63gy-6njy-kbd8 |
|
| 4 |
| url |
VCID-6j55-bstz-yybj |
| vulnerability_id |
VCID-6j55-bstz-yybj |
| summary |
High severity vulnerability that affects actionpack
actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0449 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68141 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68064 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68083 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68062 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68113 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68128 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68152 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68138 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68105 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68042 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0449 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0449, GHSA-4ww3-3rxj-8v6q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6j55-bstz-yybj |
|
| 5 |
| url |
VCID-7f5r-9h1g-nuch |
| vulnerability_id |
VCID-7f5r-9h1g-nuch |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68185 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68147 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.6818 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68102 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68125 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68084 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3086 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3086, GHSA-fg9w-g6m4-557j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f5r-9h1g-nuch |
|
| 6 |
| url |
VCID-a6sp-18av-wya6 |
| vulnerability_id |
VCID-a6sp-18av-wya6 |
| summary |
Possible Strong Parameters Bypass in ActionPack
There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails <= 6.0.3
Not affected: rails < 5.0.0
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value of `each`, or `each_value`,
or `each_pair` will return the underlying "untrusted" hash of data that was
read from the parameters. Applications that use this return value may be
inadvertently use untrusted user input.
Impacted code will look something like this:
```
def update
# Attacker has included the parameter: `{ is_admin: true }`
User.update(clean_up_params)
end
def clean_up_params
params.each { |k, v| SomeModel.check(v) if k == :name }
end
```
Note the mistaken use of `each` in the `clean_up_params` method in the above
example.
Workarounds
-----------
Do not use the return values of `each`, `each_value`, or `each_pair` in your
application. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91752 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.9169 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91698 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91703 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91724 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91734 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91736 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91732 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8164 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:gem/actionpack@5.2.4.3 |
| purl |
pkg:gem/actionpack@5.2.4.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1xgz-hwng-n3eq |
|
| 1 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 2 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 3 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 4 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 5 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 6 |
| vulnerability |
VCID-gjey-bqtd-kqa1 |
|
| 7 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 8 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 9 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 10 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 11 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 12 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 13 |
| vulnerability |
VCID-wg3a-j2dp-ayh4 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@5.2.4.3 |
|
| 1 |
| url |
pkg:gem/actionpack@6.0.3.1 |
| purl |
pkg:gem/actionpack@6.0.3.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12x8-jxdf-jqdz |
|
| 1 |
| vulnerability |
VCID-1bxs-yghe-cyck |
|
| 2 |
| vulnerability |
VCID-1x8k-t8mr-3fgp |
|
| 3 |
| vulnerability |
VCID-1xgz-hwng-n3eq |
|
| 4 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 5 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 6 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 7 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-gjey-bqtd-kqa1 |
|
| 10 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 11 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 12 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 13 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 14 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 15 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 16 |
| vulnerability |
VCID-wg3a-j2dp-ayh4 |
|
| 17 |
| vulnerability |
VCID-wyy6-h8bq-vyde |
|
| 18 |
| vulnerability |
VCID-zy7d-3db6-sydw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.0.3.1 |
|
|
| aliases |
CVE-2020-8164, GHSA-8727-m6gj-mc37
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6sp-18av-wya6 |
|
| 7 |
| url |
VCID-cdnw-t8n1-23ep |
| vulnerability_id |
VCID-cdnw-t8n1-23ep |
| summary |
Improper Input Validation
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3187 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.92606 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.92653 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.9264 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.92636 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.9263 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.92619 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.09049 |
| scoring_system |
epss |
| scoring_elements |
0.92612 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3187 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3187, GHSA-3vfw-7rcp-3xgm
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdnw-t8n1-23ep |
|
| 8 |
| url |
VCID-cnqr-6e98-5kgk |
| vulnerability_id |
VCID-cnqr-6e98-5kgk |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0446 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71366 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71274 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71282 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.713 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71316 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71329 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71352 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.71337 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0067 |
| scoring_system |
epss |
| scoring_elements |
0.7132 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0446 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0446, GHSA-75w6-p6mg-vh8j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cnqr-6e98-5kgk |
|
| 9 |
| url |
VCID-dd9p-x7k3-37ea |
| vulnerability_id |
VCID-dd9p-x7k3-37ea |
| summary |
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to
The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45215 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45164 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45162 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45174 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45173 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.4512 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45155 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28362 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28362, GHSA-4g8v-vg43-wpgf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dd9p-x7k3-37ea |
|
| 10 |
| url |
VCID-ehbj-aezy-d7h4 |
| vulnerability_id |
VCID-ehbj-aezy-d7h4 |
| summary |
Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch
# Possible ReDoS vulnerability in Accept header parsing in Action Dispatch
There is a possible ReDoS vulnerability in the Accept header parsing routines
of Action Dispatch. This vulnerability has been assigned the CVE identifier
CVE-2024-26142.
Versions Affected: >= 7.1.0, < 7.1.3.1
Not affected: < 7.1.0
Fixed Versions: 7.1.3.1
Impact
------
Carefully crafted Accept headers can cause Accept header parsing in Action
Dispatch to take an unexpected amount of time, possibly resulting in a DoS
vulnerability. All users running an affected release should either upgrade or
use one of the workarounds immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby
3.2 or newer are unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
There are no feasible workarounds for this issue.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 7-1-accept-redox.patch - Patch for 7.1 series
Credits
-------
Thanks [svalkanov](https://hackerone.com/svalkanov) for the report and patch! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26142 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87692 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.8768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87685 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87632 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87647 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87645 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87674 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87667 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26142 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26142, GHSA-jjhx-jhvp-74wq
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ehbj-aezy-d7h4 |
|
| 11 |
| url |
VCID-g3rk-djae-pkeh |
| vulnerability_id |
VCID-g3rk-djae-pkeh |
| summary |
Possible Content Security Policy bypass in Action Dispatch
There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack.
Impact
------
Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.
Credits
-------
Thanks to [ryotak](https://hackerone.com/ryotak) for the report! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54133 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31424 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31466 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.4089 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40883 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40852 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54133 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-54133, GHSA-vfm5-rmrh-j26v
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g3rk-djae-pkeh |
|
| 12 |
| url |
VCID-hmp2-rmzv-wkhg |
| vulnerability_id |
VCID-hmp2-rmzv-wkhg |
| summary |
Improper Input Validation
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74282 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74301 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.7428 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74259 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74232 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74228 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74265 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74311 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74274 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2929 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2929, GHSA-r7q2-5gqg-6c7q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hmp2-rmzv-wkhg |
|
| 13 |
| url |
VCID-hppf-a715-r7b2 |
| vulnerability_id |
VCID-hppf-a715-r7b2 |
| summary |
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81303 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.8121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81234 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81288 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81266 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22795, GHSA-8xww-x3g3-6jcv, GMS-2023-56
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hppf-a715-r7b2 |
|
| 14 |
| url |
VCID-j24x-nhsb-yug6 |
| vulnerability_id |
VCID-j24x-nhsb-yug6 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63314 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6319 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63249 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63295 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63313 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6333 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2197, GHSA-v9v4-7jp6-8c73
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j24x-nhsb-yug6 |
|
| 15 |
| url |
VCID-knsd-pv15-tydx |
| vulnerability_id |
VCID-knsd-pv15-tydx |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74293 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74208 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74213 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7426 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74282 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74263 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74256 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2931 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2931, GHSA-v5jg-558j-q67c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-knsd-pv15-tydx |
|
| 16 |
| url |
VCID-mnkw-23eu-bkgc |
| vulnerability_id |
VCID-mnkw-23eu-bkgc |
| summary |
Ability to forge per-form CSRF tokens in Rails
It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session.
Impact
------
Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63311 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63364 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63312 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63284 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63225 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:gem/actionpack@5.2.4.3 |
| purl |
pkg:gem/actionpack@5.2.4.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1xgz-hwng-n3eq |
|
| 1 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 2 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 3 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 4 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 5 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 6 |
| vulnerability |
VCID-gjey-bqtd-kqa1 |
|
| 7 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 8 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 9 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 10 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 11 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 12 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 13 |
| vulnerability |
VCID-wg3a-j2dp-ayh4 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@5.2.4.3 |
|
| 1 |
| url |
pkg:gem/actionpack@6.0.3.1 |
| purl |
pkg:gem/actionpack@6.0.3.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-12x8-jxdf-jqdz |
|
| 1 |
| vulnerability |
VCID-1bxs-yghe-cyck |
|
| 2 |
| vulnerability |
VCID-1x8k-t8mr-3fgp |
|
| 3 |
| vulnerability |
VCID-1xgz-hwng-n3eq |
|
| 4 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 5 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 6 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 7 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-gjey-bqtd-kqa1 |
|
| 10 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 11 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 12 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 13 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 14 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 15 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 16 |
| vulnerability |
VCID-wg3a-j2dp-ayh4 |
|
| 17 |
| vulnerability |
VCID-wyy6-h8bq-vyde |
|
| 18 |
| vulnerability |
VCID-zy7d-3db6-sydw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.0.3.1 |
|
|
| aliases |
CVE-2020-8166, GHSA-jp5v-5gx4-jmj9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mnkw-23eu-bkgc |
|
| 17 |
| url |
VCID-msda-xqbp-qfdd |
| vulnerability_id |
VCID-msda-xqbp-qfdd |
| summary |
Possible Open Redirect Vulnerability in Action Pack
There is a possible Open Redirect Vulnerability in Action Pack.
Versions Affected: >= v6.1.0.rc2
Not affected: < v6.1.0.rc2
Fixed Versions: 6.1.3.2
Impact
------
This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious
website.
Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch put in an initializer can be used as a workaround.
```ruby
class ActionDispatch::HostAuthorization::Permissions
def sanitize_string(host)
if host.start_with?(".")
/\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i
else
/\A#{Regexp.escape host}\z/i
end
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 6-1-open-redirect.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22903 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35808 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35768 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35791 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3592 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35831 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35801 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35693 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35751 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3589 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22903 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:gem/actionpack@6.1.3.2 |
| purl |
pkg:gem/actionpack@6.1.3.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1bxs-yghe-cyck |
|
| 1 |
| vulnerability |
VCID-1x8k-t8mr-3fgp |
|
| 2 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 3 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 4 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 5 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 6 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 7 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 8 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 9 |
| vulnerability |
VCID-p22r-u1dd-b7b3 |
|
| 10 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 11 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 12 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.1.3.2 |
|
|
| aliases |
CVE-2021-22903, GHSA-5hq2-xf89-9jxq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-msda-xqbp-qfdd |
|
| 18 |
| url |
VCID-p5mc-r1rg-5ff7 |
| vulnerability_id |
VCID-p5mc-r1rg-5ff7 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in actionview. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27777 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.7586 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75823 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75848 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75824 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.7578 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75768 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27777 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27777, GHSA-ch3h-j2vf-95pv, GMS-2022-1138
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p5mc-r1rg-5ff7 |
|
| 19 |
| url |
VCID-phxs-zet8-ryh3 |
| vulnerability_id |
VCID-phxs-zet8-ryh3 |
| summary |
SQL Injection
Ruby on Rails contains a flaw related to the way ActiveRecord handles parameters in conjunction with the way Rack parses query parameters. This issue may allow an attacker to inject arbitrary `IS NULL` clauses in to application SQL queries. This may also allow an attacker to have the SQL query check for `NULL` in arbitrary places. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52801 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.527 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52751 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52745 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52796 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52763 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52663 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2660 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2660, GHSA-hgpp-pp89-4fgf, OSV-82610
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-phxs-zet8-ryh3 |
|
| 20 |
| url |
VCID-rps2-k24p-9qgq |
| vulnerability_id |
VCID-rps2-k24p-9qgq |
| summary |
Translate helper method which may allow an attacker to insert arbitrary code into a page
The helper method for i18n translations has a convention whereby translations strings with a name ending in 'html' are considered HTML safe. There is also a mechanism for interpolation. It has been discovered that these 'html' strings allow arbitrary values to be contained in the interpolated input, and these values are not escaped. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.6969 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69705 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69666 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69607 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69718 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69636 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69621 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4319 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4319, GHSA-xxr8-833v-c7wc, OSV-77199
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rps2-k24p-9qgq |
|
| 21 |
| url |
VCID-sfyc-jewr-wuf5 |
| vulnerability_id |
VCID-sfyc-jewr-wuf5 |
| summary |
Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887.
Impact
------
For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.
Credits
-------
Thanks to [scyoon](https://hackerone.com/scyoon) for reporting |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47887 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5297 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52932 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52914 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52901 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47887 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47887, GHSA-vfg9-r3fq-jvx4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sfyc-jewr-wuf5 |
|
| 22 |
| url |
VCID-sgdb-985e-4uej |
| vulnerability_id |
VCID-sgdb-985e-4uej |
| summary |
Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128.
Impact
------
Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.
Credits
-------
Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://access.redhat.com/security/cve/cve-2024-41128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://access.redhat.com/security/cve/cve-2024-41128 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-41128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69608 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69657 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69618 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69632 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69647 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-41128 |
|
| 3 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2319036 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2319036 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/rails/rails |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/rails/rails |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-41128, GHSA-x76w-6vjr-8xgj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sgdb-985e-4uej |
|
| 23 |
| url |
VCID-tt6r-bytq-4fa4 |
| vulnerability_id |
VCID-tt6r-bytq-4fa4 |
| summary |
actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2694 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44682 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44693 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44728 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44673 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2694 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2694, GHSA-q34c-48gc-m9g8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tt6r-bytq-4fa4 |
|
| 24 |
| url |
VCID-vgm2-8wjy-x7ed |
| vulnerability_id |
VCID-vgm2-8wjy-x7ed |
| summary |
Improper Input Validation
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-7248 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.9359 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93535 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93544 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93552 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93561 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93564 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.9357 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.11409 |
| scoring_system |
epss |
| scoring_elements |
0.93571 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-7248 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-7248, GHSA-8fqx-7pv4-3jwm
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vgm2-8wjy-x7ed |
|
| 25 |
| url |
VCID-wg3a-j2dp-ayh4 |
| vulnerability_id |
VCID-wg3a-j2dp-ayh4 |
| summary |
Possible DoS Vulnerability in Action Controller Token Authentication
There is a possible DoS vulnerability in the Token Authentication logic in Action Controller.
Versions Affected: >= 4.0.0
Not affected: < 4.0.0
Fixed Versions: 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6
Impact
------
Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this:
```
class PostsController < ApplicationController
before_action :authenticate
private
def authenticate
authenticate_or_request_with_http_token do |token, options|
# ...
end
end
end
```
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around the issue:
```ruby
module ActionController::HttpAuthentication::Token
AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 5-2-http-authentication-dos.patch - Patch for 5.2 series
* 6-0-http-authentication-dos.patch - Patch for 6.0 series
* 6-1-http-authentication-dos.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22904 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92022 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92007 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91966 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91974 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22904 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:gem/actionpack@5.2.6 |
| purl |
pkg:gem/actionpack@5.2.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 1 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 2 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 3 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 4 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 5 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 6 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 7 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 8 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 9 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 10 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@5.2.6 |
|
| 2 |
| url |
pkg:gem/actionpack@6.0.3.7 |
| purl |
pkg:gem/actionpack@6.0.3.7 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1bxs-yghe-cyck |
|
| 1 |
| vulnerability |
VCID-1x8k-t8mr-3fgp |
|
| 2 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 3 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 4 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 5 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 6 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 7 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 8 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 9 |
| vulnerability |
VCID-msda-xqbp-qfdd |
|
| 10 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 11 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 12 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.0.3.7 |
|
| 3 |
| url |
pkg:gem/actionpack@6.1.3.2 |
| purl |
pkg:gem/actionpack@6.1.3.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1bxs-yghe-cyck |
|
| 1 |
| vulnerability |
VCID-1x8k-t8mr-3fgp |
|
| 2 |
| vulnerability |
VCID-63gy-6njy-kbd8 |
|
| 3 |
| vulnerability |
VCID-ce39-j83r-6ug9 |
|
| 4 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 5 |
| vulnerability |
VCID-ehbj-aezy-d7h4 |
|
| 6 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 7 |
| vulnerability |
VCID-hppf-a715-r7b2 |
|
| 8 |
| vulnerability |
VCID-jwun-grgg-2uet |
|
| 9 |
| vulnerability |
VCID-p22r-u1dd-b7b3 |
|
| 10 |
| vulnerability |
VCID-p5mc-r1rg-5ff7 |
|
| 11 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 12 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:gem/actionpack@6.1.3.2 |
|
|
| aliases |
CVE-2021-22904, GHSA-7wjx-3g7j-8584
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wg3a-j2dp-ayh4 |
|