| 0 |
| url |
VCID-1xgz-hwng-n3eq |
| vulnerability_id |
VCID-1xgz-hwng-n3eq |
| summary |
Untrusted users can run pending migrations in production in Rails
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production)
Fixed Versions: rails >= 6.0.3.2
Impact
------
Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already run.
Workarounds
-----------
Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb:
`config.middleware.delete ActionDispatch::ActionableExceptions` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71577 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71597 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71532 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71509 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71515 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71592 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.71564 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00679 |
| scoring_system |
epss |
| scoring_elements |
0.7158 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8185 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8185, GHSA-c6qr-h5vq-59jc
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xgz-hwng-n3eq |
|
| 1 |
| url |
VCID-5bh7-drnb-7ygg |
| vulnerability_id |
VCID-5bh7-drnb-7ygg |
| summary |
Rails has possible XSS Vulnerability in Action Controller
# Possible XSS Vulnerability in Action Controller
There is a possible XSS vulnerability when using the translation helpers
(`translate`, `t`, etc) in Action Controller. This vulnerability has been
assigned the CVE identifier CVE-2024-26143.
Versions Affected: >= 7.0.0.
Not affected: < 7.0.0
Fixed Versions: 7.1.3.1, 7.0.8.1
Impact
------
Applications using translation methods like `translate`, or `t` on a
controller, with a key ending in "_html", a `:default` key which contains
untrusted user input, and the resulting string is used in a view, may be
susceptible to an XSS vulnerability.
For example, impacted code will look something like this:
```ruby
class ArticlesController < ApplicationController
def show
@message = t("message_html", default: untrusted_input)
# The `show` template displays the contents of `@message`
end
end
```
To reiterate the pre-conditions, applications must:
* Use a translation function from a controller (i.e. _not_ I18n.t, or `t` from
a view)
* Use a key that ends in `_html`
* Use a default value where the default value is untrusted and unescaped input
* Send the text to the victim (whether that's part of a template, or a
`render` call)
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
There are no feasible workarounds for this issue.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 7-0-translate-xss.patch - Patch for 7.0 series
* 7-1-translate-xss.patch - Patch for 7.1 series
Credits
-------
Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the patch and fix! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26143 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83959 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83957 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83933 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83944 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83927 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83921 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83898 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83896 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.8388 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26143 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26143, GHSA-9822-6m93-xqf4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5bh7-drnb-7ygg |
|
| 2 |
| url |
VCID-5hqj-fxmk-cbcy |
| vulnerability_id |
VCID-5hqj-fxmk-cbcy |
| summary |
XSS Vulnerability in number_to_currency
The number_to_currency helper allows users to nicely format a numeric value. The unit parameter is not escaped correctly. Application which pass user controlled data as the unit parameter are vulnerable to an XSS attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6415 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81207 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81116 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81139 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81165 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81172 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81191 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81171 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81208 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81209 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01506 |
| scoring_system |
epss |
| scoring_elements |
0.81107 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6415 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6415, GHSA-6h5q-96hp-9jgm, OSV-100524
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5hqj-fxmk-cbcy |
|
| 3 |
| url |
VCID-65tq-e5eb-eucj |
| vulnerability_id |
VCID-65tq-e5eb-eucj |
| summary |
Rails has possible Sensitive Session Information Leak in Active Storage
# Possible Sensitive Session Information Leak in Active Storage
There is a possible sensitive session information leak in Active Storage. By
default, Active Storage sends a `Set-Cookie` header along with the user's
session cookie when serving blobs. It also sets `Cache-Control` to public.
Certain proxies may cache the Set-Cookie, leading to an information leak.
This vulnerability has been assigned the CVE identifier CVE-2024-26144.
Versions Affected: >= 5.2.0, < 7.1.0
Not affected: < 5.2.0, > 7.1.0
Fixed Versions: 7.0.8.1, 6.1.7.7
Impact
------
A proxy which chooses to caches this request can cause users to share
sessions. This may include a user receiving an attacker's session or vice
versa.
This was patched in 7.1.0 but not previously identified as a security
vulnerability.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Upgrade to Rails 7.1.X, or configure caching proxies not to cache the
Set-Cookie headers.
Credits
-------
Thanks to [tyage](https://hackerone.com/tyage) for reporting this! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86828 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86809 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86814 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86818 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86804 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86796 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86759 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.03103 |
| scoring_system |
epss |
| scoring_elements |
0.86778 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26144 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26144, GHSA-8h22-8cf7-hq6g
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-65tq-e5eb-eucj |
|
| 4 |
| url |
VCID-6j55-bstz-yybj |
| vulnerability_id |
VCID-6j55-bstz-yybj |
| summary |
High severity vulnerability that affects actionpack
actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0449 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68136 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68062 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68113 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68128 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68152 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68138 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68105 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68141 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68154 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68042 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68064 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68083 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0449 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0449, GHSA-4ww3-3rxj-8v6q
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6j55-bstz-yybj |
|
| 5 |
| url |
VCID-6tty-dbwx-rbgx |
| vulnerability_id |
VCID-6tty-dbwx-rbgx |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22797 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.3346 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33494 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33518 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33638 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.3352 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33605 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33506 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33548 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22797 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22797, GHSA-9445-4cr6-336r, GMS-2023-57
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6tty-dbwx-rbgx |
|
| 6 |
| url |
VCID-awt1-8bxs-xffs |
| vulnerability_id |
VCID-awt1-8bxs-xffs |
| summary |
actionpack Improper Authentication vulnerability
The `decode_credentials` method in `actionpack/lib/action_controller/metal/http_authentication.rb` in Ruby on Rails before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a `with_http_digest` helper method, as demonstrated by the `authenticate_or_request_with_http_digest` method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3424 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.7676 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76771 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76799 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76818 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76714 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76718 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76746 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76729 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3424 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3424, GHSA-92w9-2pqw-rhjj, OSV-84243
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-awt1-8bxs-xffs |
|
| 7 |
| url |
VCID-c1w4-z275-tqg7 |
| vulnerability_id |
VCID-c1w4-z275-tqg7 |
| summary |
Ruby on Rails Potential XSS Vulnerability in select_tag prompt
When a value for the `prompt` field is supplied to the `select_tag` helper, the value is not escaped. If untrusted data is not escaped, and is supplied as the prompt value, there is a potential for XSS attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3463 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56143 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56166 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56177 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56171 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56174 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56001 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.5613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00333 |
| scoring_system |
epss |
| scoring_elements |
0.56161 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3463 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3463, GHSA-98mf-8f57-64qf, OSV-84515
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c1w4-z275-tqg7 |
|
| 8 |
| url |
VCID-e3j5-xgbr-2qa1 |
| vulnerability_id |
VCID-e3j5-xgbr-2qa1 |
| summary |
Possible DoS Vulnerability
A carefully crafted email address in conjunction with the Action Mailer logger format string could take advantage of a bug in Ruby's sprintf implementation and possibly lead to a denial of service attack. Impacted Ruby code will look something like this: `"some string #{user_input}" % some_number` |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4389 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79994 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.7993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79959 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79968 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79988 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79971 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79963 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79991 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79914 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.01333 |
| scoring_system |
epss |
| scoring_elements |
0.79921 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4389 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4389, GHSA-rg5m-3fqp-6px8, OSV-98629
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e3j5-xgbr-2qa1 |
|
| 9 |
| url |
VCID-ehbj-aezy-d7h4 |
| vulnerability_id |
VCID-ehbj-aezy-d7h4 |
| summary |
Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch
# Possible ReDoS vulnerability in Accept header parsing in Action Dispatch
There is a possible ReDoS vulnerability in the Accept header parsing routines
of Action Dispatch. This vulnerability has been assigned the CVE identifier
CVE-2024-26142.
Versions Affected: >= 7.1.0, < 7.1.3.1
Not affected: < 7.1.0
Fixed Versions: 7.1.3.1
Impact
------
Carefully crafted Accept headers can cause Accept header parsing in Action
Dispatch to take an unexpected amount of time, possibly resulting in a DoS
vulnerability. All users running an affected release should either upgrade or
use one of the workarounds immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby
3.2 or newer are unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
There are no feasible workarounds for this issue.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 7-1-accept-redox.patch - Patch for 7.1 series
Credits
-------
Thanks [svalkanov](https://hackerone.com/svalkanov) for the report and patch! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26142 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.8769 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87692 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87645 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87674 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87667 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87647 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.8768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87632 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87685 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26142 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26142, GHSA-jjhx-jhvp-74wq
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ehbj-aezy-d7h4 |
|
| 10 |
| url |
VCID-h94p-ywve-y7h9 |
| vulnerability_id |
VCID-h94p-ywve-y7h9 |
| summary |
XSS Vulnerability in simple_format helper
The simple_format helper converts user supplied text into html text which is intended to be safe for display. A change made to the implementation of this helper means that any user provided HTML attributes will not be escaped correctly. As a result of this error, applications which pass user-controlled data to be included as html attributes will be vulnerable to an XSS attack. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6416 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46517 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46448 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46487 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46516 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46573 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4657 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6416 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6416, GHSA-w37c-q653-qg95, OSV-100526
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h94p-ywve-y7h9 |
|
| 11 |
| url |
VCID-hmp2-rmzv-wkhg |
| vulnerability_id |
VCID-hmp2-rmzv-wkhg |
| summary |
Improper Input Validation
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74311 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74274 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74282 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74301 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74265 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74259 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.7428 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74312 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.7432 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74232 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00814 |
| scoring_system |
epss |
| scoring_elements |
0.74228 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2929 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2929, GHSA-r7q2-5gqg-6c7q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hmp2-rmzv-wkhg |
|
| 12 |
| url |
VCID-j24x-nhsb-yug6 |
| vulnerability_id |
VCID-j24x-nhsb-yug6 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63301 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63314 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6333 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63295 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63313 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6319 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63249 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2197, GHSA-v9v4-7jp6-8c73
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j24x-nhsb-yug6 |
|
| 13 |
| url |
VCID-j8zg-kq3z-jqcm |
| vulnerability_id |
VCID-j8zg-kq3z-jqcm |
| summary |
Improper Input Validation
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3933 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72324 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72336 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72327 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72284 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72297 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72314 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72292 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.7228 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72265 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72239 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00712 |
| scoring_system |
epss |
| scoring_elements |
0.72241 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3933 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-3933, GHSA-gjxw-5w2q-7grf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j8zg-kq3z-jqcm |
|
| 14 |
| url |
VCID-kcj2-v7av-47cv |
| vulnerability_id |
VCID-kcj2-v7av-47cv |
| summary |
Reflective XSS Vulnerability
There is a vulnerability in the internationalisation component of Ruby on Rails. When the i18n gem is unable to provide a translation for a given string, it creates a fallback HTML string. Under certain common configurations this string can contain user input which would allow an attacker to execute a reflective XSS attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4491 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72342 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72298 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.7231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72333 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72316 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72303 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72354 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72258 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72264 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72283 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00713 |
| scoring_system |
epss |
| scoring_elements |
0.72259 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4491 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4491, GHSA-699m-mcjm-9cw8, OSV-100528
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kcj2-v7av-47cv |
|
| 15 |
| url |
VCID-msda-xqbp-qfdd |
| vulnerability_id |
VCID-msda-xqbp-qfdd |
| summary |
Possible Open Redirect Vulnerability in Action Pack
There is a possible Open Redirect Vulnerability in Action Pack.
Versions Affected: >= v6.1.0.rc2
Not affected: < v6.1.0.rc2
Fixed Versions: 6.1.3.2
Impact
------
This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious
website.
Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch put in an initializer can be used as a workaround.
```ruby
class ActionDispatch::HostAuthorization::Permissions
def sanitize_string(host)
if host.start_with?(".")
/\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i
else
/\A#{Regexp.escape host}\z/i
end
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 6-1-open-redirect.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22903 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35747 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35693 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3589 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3592 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35751 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35801 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35831 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35791 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35768 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35808 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35796 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22903 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22903, GHSA-5hq2-xf89-9jxq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-msda-xqbp-qfdd |
|
| 16 |
| url |
VCID-n5fx-u6fs-vydu |
| vulnerability_id |
VCID-n5fx-u6fs-vydu |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/cast.rb in Active Record in Ruby on Rails beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving \ (backslash) characters that are not properly handled in operations on array columns. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48065 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.4805 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48074 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48062 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.4811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.47995 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48033 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48053 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00248 |
| scoring_system |
epss |
| scoring_elements |
0.48003 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0080 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0080, GHSA-hqf9-rc9j-5fmj, OSV-103438
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n5fx-u6fs-vydu |
|
| 17 |
| url |
VCID-nf8s-2aaa-17fw |
| vulnerability_id |
VCID-nf8s-2aaa-17fw |
| summary |
Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)
Due to the way that `Rack::Request` and `Rails::Request` interact, it is possible for a 3rd party or custom rack middleware to parse the parameters insecurely and store them in the same key that Rails uses for its own parameters. In the event that happens the application will receive unsafe parameters and could be vulnerable to the earlier vulnerability: it would be possible for an attacker to issue unexpected database queries with `IS NULL` or empty where clauses. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6417 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66501 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66468 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66515 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.6653 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66512 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66508 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.6652 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66439 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66402 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66441 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6417 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6417, GHSA-wpw7-wxjm-cw8r, OSV-100527
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nf8s-2aaa-17fw |
|
| 18 |
| url |
VCID-p22r-u1dd-b7b3 |
| vulnerability_id |
VCID-p22r-u1dd-b7b3 |
| summary |
Missing security headers in Action Pack on non-HTML responses
# Permissions-Policy is Only Served on HTML Content-Type
The application configurable Permissions-Policy is only served on responses
with an HTML related Content-Type.
This has been assigned the CVE identifier CVE-2024-28103.
Versions Affected: >= 6.1.0
Not affected: < 6.1.0
Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4
Impact
------
Responses with a non-HTML Content-Type are not serving the configured Permissions-Policy. There are certain non-HTML Content-Types that would benefit from having the Permissions-Policy enforced.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
N/A
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the supported release series in accordance with our
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)
regarding security issues. They are in git-am format and consist of a
single changeset.
* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series
* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series
* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series
Credits
-------
Thank you [shinkbr](https://hackerone.com/shinkbr) for reporting this! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-28103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74612 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74621 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74613 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74576 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74585 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74581 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74559 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74532 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74604 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-28103 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-28103, GHSA-fwhr-88qx-h9g7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p22r-u1dd-b7b3 |
|
| 19 |
| url |
VCID-pd5s-1xsg-f7a5 |
| vulnerability_id |
VCID-pd5s-1xsg-f7a5 |
| summary |
Rails has a possible XSS vulnerability in its Action Pack debug exceptions
### Impact
The debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (`config.consider_all_requests_local = true`), which is the default in development.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05104 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04946 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05005 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05023 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05063 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05047 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04992 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05014 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04965 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33167 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/rails/rails |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
1.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/rails/rails |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/rails/rails/releases/tag/v8.1.2.1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
1.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
1.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T18:44:05Z/ |
|
|
| url |
https://github.com/rails/rails/releases/tag/v8.1.2.1 |
|
| 6 |
| reference_url |
https://github.com/rails/rails/security/advisories/GHSA-pgm4-439c-5jp6 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
LOW |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 1 |
| value |
1.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
1.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T18:44:05Z/ |
|
|
| url |
https://github.com/rails/rails/security/advisories/GHSA-pgm4-439c-5jp6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33167, GHSA-pgm4-439c-5jp6
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pd5s-1xsg-f7a5 |
|
| 20 |
| url |
VCID-pmrb-t3bm-zkb6 |
| vulnerability_id |
VCID-pmrb-t3bm-zkb6 |
| summary |
Denial of Service Vulnerability in Action View
There is a denial of service vulnerability in the header handling component of Action View. Strings sent in specially crafted headers will be cached indefinitely. This can cause the cache to grow infinitely, which will eventually consume all memory on the target machine, causing a denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6414 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98691 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98688 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98687 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98704 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98702 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.987 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98699 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98696 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.70843 |
| scoring_system |
epss |
| scoring_elements |
0.98695 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6414 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6414, GHSA-mpxf-gcw2-pw5q, OSV-100525
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmrb-t3bm-zkb6 |
|
| 21 |
| url |
VCID-rps2-k24p-9qgq |
| vulnerability_id |
VCID-rps2-k24p-9qgq |
| summary |
Translate helper method which may allow an attacker to insert arbitrary code into a page
The helper method for i18n translations has a convention whereby translations strings with a name ending in 'html' are considered HTML safe. There is also a mechanism for interpolation. It has been discovered that these 'html' strings allow arbitrary values to be contained in the interpolated input, and these values are not escaped. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69718 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.6969 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69705 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69621 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69708 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69727 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69607 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69636 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69666 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00607 |
| scoring_system |
epss |
| scoring_elements |
0.69615 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4319 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4319, GHSA-xxr8-833v-c7wc, OSV-77199
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rps2-k24p-9qgq |
|
| 22 |
| url |
VCID-rq7w-zmh4-17e1 |
| vulnerability_id |
VCID-rq7w-zmh4-17e1 |
| summary |
SQL injection vulnerability in Active Record
Due to the way Active Record handles nested query parameters, an attacker can use a specially crafted request to inject some forms of SQL into your application's SQL queries. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72697 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72652 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72604 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72611 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72628 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72605 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72656 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72679 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.0073 |
| scoring_system |
epss |
| scoring_elements |
0.72662 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2661 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2661, GHSA-fh39-v733-mxfr, OSV-82403
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rq7w-zmh4-17e1 |
|
| 23 |
| url |
VCID-rqfj-8y7h-eqgm |
| vulnerability_id |
VCID-rqfj-8y7h-eqgm |
| summary |
ActionText ContentAttachment can Contain Unsanitized HTML
Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML.
This has been assigned the CVE identifier CVE-2024-32464.
Versions Affected: >= 7.1.0
Not affected: < 7.1.0
Fixed Versions: 7.1.3.4
Impact
------
This could lead to a potential cross site scripting issue within the Trix editor.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
N/A
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the supported release series in accordance with our [maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues) regarding security issues. They are in git-am format and consist of a single changeset.
* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series
Credits
-------
Thank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this! |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32464 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51354 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51393 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.5138 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.5143 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51451 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.514 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51414 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51435 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.0028 |
| scoring_system |
epss |
| scoring_elements |
0.51392 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32464 |
|
| 1 |
| reference_url |
https://github.com/rails/rails |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/rails/rails |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32464, GHSA-prjp-h48f-jgf6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqfj-8y7h-eqgm |
|
| 24 |
| url |
VCID-up42-s1t8-eqa1 |
| vulnerability_id |
VCID-up42-s1t8-eqa1 |
| summary |
Information disclosure issue in Active Resource
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52006 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52142 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.5216 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52116 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52131 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52148 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52096 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52046 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52081 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52054 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8151 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8151, GHSA-46j2-xjgp-jrfm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-up42-s1t8-eqa1 |
|
| 25 |
| url |
VCID-uudj-r63z-kban |
| vulnerability_id |
VCID-uudj-r63z-kban |
| summary |
XML Parsing Vulnerability affecting JRuby users
There is a vulnerability in the JDOM backend to ActiveSupport's XML parser. you should upgrade or use one of the work arounds immediately. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1856 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72205 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72196 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72155 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72184 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72162 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72136 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.7219 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72114 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.7211 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.7215 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00707 |
| scoring_system |
epss |
| scoring_elements |
0.72116 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1856 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1856, GHSA-9c2j-593q-3g82, OSV-91451
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uudj-r63z-kban |
|
| 26 |
| url |
VCID-xxbb-7e3n-9yb3 |
| vulnerability_id |
VCID-xxbb-7e3n-9yb3 |
| summary |
Cross site scripting in actionpack Rubygem
A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1497 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55742 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55584 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55696 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55718 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55747 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5574 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55722 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5576 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55764 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1497 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-1497, GHSA-q58j-fmvf-9rq6
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxbb-7e3n-9yb3 |
|
| 27 |
| url |
VCID-y54w-a8kr-suhy |
| vulnerability_id |
VCID-y54w-a8kr-suhy |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.718 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71795 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71752 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.7177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.7175 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71783 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71762 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71786 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71719 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71738 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0448 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0448, GHSA-jmm9-2p29-vh2w
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y54w-a8kr-suhy |
|