Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (10)
Vulnerability Summary Aliases
VCID-1bxs-yghe-cyck URL Redirection to Untrusted Site ('Open Redirect') A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website. CVE-2021-22942
GHSA-2rqw-v265-jf8c
VCID-1x8k-t8mr-3fgp URL Redirection to Untrusted Site ('Open Redirect') A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. CVE-2021-44528
GHSA-qphc-hf5q-v8fc
VCID-63gy-6njy-kbd8 ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted `X_FORWARDED_HOST` header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. CVE-2023-22792
GHSA-p84v-45xj-wwqj
GMS-2023-58
VCID-6ku5-mtgz-zygw Duplicate This advisory duplicates another. CVE-2023-22796
GHSA-j6gc-792m-qgm2
GMS-2023-61
VCID-ce39-j83r-6ug9 Duplicate This advisory duplicates another. CVE-2022-22577
GHSA-mm33-5vfq-3mm3
GMS-2022-1137
VCID-drg6-gj1f-h7ea Duplicate This advisory duplicates another. CVE-2022-21831
GHSA-w749-p3v6-hccq
GMS-2022-301
VCID-hppf-a715-r7b2 ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. CVE-2023-22795
GHSA-8xww-x3g3-6jcv
GMS-2023-56
VCID-jwun-grgg-2uet Exposure of information in Action Pack Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests. This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used. CVE-2022-23633
CVE-2022-23634
GHSA-rmj8-8hhh-gv5h
GHSA-wh98-p28r-vrc9
VCID-p5mc-r1rg-5ff7 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in actionview. CVE-2022-27777
GHSA-ch3h-j2vf-95pv
GMS-2022-1138
VCID-t9yh-ss8z-e3cb Duplicate This advisory duplicates another. CVE-2023-22794
GHSA-hq7p-j377-6v63
GMS-2023-60

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:51:42.029073+00:00 Debian Importer Fixing VCID-t9yh-ss8z-e3cb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:19.913483+00:00 Debian Importer Fixing VCID-6ku5-mtgz-zygw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:08.738332+00:00 Debian Importer Fixing VCID-63gy-6njy-kbd8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:08:39.315951+00:00 Debian Importer Fixing VCID-ce39-j83r-6ug9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:48.563359+00:00 Debian Importer Fixing VCID-1bxs-yghe-cyck https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:38.394301+00:00 Debian Importer Fixing VCID-jwun-grgg-2uet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:02.607473+00:00 Debian Importer Fixing VCID-drg6-gj1f-h7ea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:46.898396+00:00 Debian Importer Fixing VCID-1x8k-t8mr-3fgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:19.843698+00:00 Debian Importer Fixing VCID-p5mc-r1rg-5ff7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:52:34.666966+00:00 Debian Importer Fixing VCID-hppf-a715-r7b2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:21:23.556015+00:00 Debian Importer Fixing VCID-63gy-6njy-kbd8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:05:51.213734+00:00 Debian Importer Fixing VCID-t9yh-ss8z-e3cb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:22.696307+00:00 Debian Importer Fixing VCID-6ku5-mtgz-zygw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:40.124263+00:00 Debian Importer Fixing VCID-1x8k-t8mr-3fgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:49.326040+00:00 Debian Importer Fixing VCID-ce39-j83r-6ug9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:49.339944+00:00 Debian Importer Fixing VCID-1bxs-yghe-cyck https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:34.342823+00:00 Debian Importer Fixing VCID-jwun-grgg-2uet https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:35.255550+00:00 Debian Importer Fixing VCID-drg6-gj1f-h7ea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:24.983280+00:00 Debian Importer Fixing VCID-p5mc-r1rg-5ff7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:57:30.380588+00:00 Debian Importer Fixing VCID-hppf-a715-r7b2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:49.235478+00:00 Debian Importer Fixing VCID-6ku5-mtgz-zygw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.167667+00:00 Debian Importer Fixing VCID-hppf-a715-r7b2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.102788+00:00 Debian Importer Fixing VCID-t9yh-ss8z-e3cb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.034499+00:00 Debian Importer Fixing VCID-63gy-6njy-kbd8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:48.823010+00:00 Debian Importer Fixing VCID-p5mc-r1rg-5ff7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:48.756863+00:00 Debian Importer Fixing VCID-jwun-grgg-2uet https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:48.691143+00:00 Debian Importer Fixing VCID-ce39-j83r-6ug9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:48.624755+00:00 Debian Importer Fixing VCID-drg6-gj1f-h7ea https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:48.557868+00:00 Debian Importer Fixing VCID-1x8k-t8mr-3fgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:48.490961+00:00 Debian Importer Fixing VCID-1bxs-yghe-cyck https://security-tracker.debian.org/tracker/data/json 38.1.0