Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/actionpack@5.2.1.rc1
purl pkg:gem/actionpack@5.2.1.rc1
Next non-vulnerable version 7.0.8.7
Latest non-vulnerable version 8.1.2.1
Risk 4.0
Vulnerabilities affecting this package (16)
Vulnerability Summary Fixed by
VCID-1xgz-hwng-n3eq
Aliases:
CVE-2020-8185
GHSA-c6qr-h5vq-59jc
Untrusted users can run pending migrations in production in Rails There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production. This vulnerability has been assigned the CVE identifier CVE-2020-8185. Versions Affected: 6.0.0 < rails < 6.0.3.2 Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production) Fixed Versions: rails >= 6.0.3.2 Impact ------ Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already run. Workarounds ----------- Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb: `config.middleware.delete ActionDispatch::ActionableExceptions`
6.0.3.2
Affected by 18 other vulnerabilities.
VCID-63gy-6njy-kbd8
Aliases:
CVE-2023-22792
GHSA-p84v-45xj-wwqj
GMS-2023-58
ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted `X_FORWARDED_HOST` header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
5.2.8
Affected by 7 other vulnerabilities.
5.2.8.15
Affected by 0 other vulnerabilities.
6.1.7.1
Affected by 8 other vulnerabilities.
7.0.4.1
Affected by 9 other vulnerabilities.
VCID-a6sp-18av-wya6
Aliases:
CVE-2020-8164
GHSA-8727-m6gj-mc37
Possible Strong Parameters Bypass in ActionPack There is a strong parameters bypass vector in ActionPack. Versions Affected: rails <= 6.0.3 Not affected: rails < 5.0.0 Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ In some cases user supplied information can be inadvertently leaked from Strong Parameters. Specifically the return value of `each`, or `each_value`, or `each_pair` will return the underlying "untrusted" hash of data that was read from the parameters. Applications that use this return value may be inadvertently use untrusted user input. Impacted code will look something like this: ``` def update # Attacker has included the parameter: `{ is_admin: true }` User.update(clean_up_params) end def clean_up_params params.each { |k, v| SomeModel.check(v) if k == :name } end ``` Note the mistaken use of `each` in the `clean_up_params` method in the above example. Workarounds ----------- Do not use the return values of `each`, `each_value`, or `each_pair` in your application.
5.2.4.3
Affected by 14 other vulnerabilities.
6.0.3.1
Affected by 19 other vulnerabilities.
VCID-ce39-j83r-6ug9
Aliases:
CVE-2022-22577
GHSA-mm33-5vfq-3mm3
GMS-2022-1137
Duplicate This advisory duplicates another.
5.2.7.1
Affected by 7 other vulnerabilities.
6.0.4.8
Affected by 7 other vulnerabilities.
6.1.5.1
Affected by 8 other vulnerabilities.
7.0.2.4
Affected by 10 other vulnerabilities.
VCID-dd9p-x7k3-37ea
Aliases:
CVE-2023-28362
GHSA-4g8v-vg43-wpgf
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362. Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4
6.1.7.4
Affected by 5 other vulnerabilities.
7.0.5.1
Affected by 6 other vulnerabilities.
VCID-ehbj-aezy-d7h4
Aliases:
CVE-2024-26142
GHSA-jjhx-jhvp-74wq
Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch # Possible ReDoS vulnerability in Accept header parsing in Action Dispatch There is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-26142. Versions Affected: >= 7.1.0, < 7.1.3.1 Not affected: < 7.1.0 Fixed Versions: 7.1.3.1 Impact ------ Carefully crafted Accept headers can cause Accept header parsing in Action Dispatch to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- There are no feasible workarounds for this issue. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 7-1-accept-redox.patch - Patch for 7.1 series Credits ------- Thanks [svalkanov](https://hackerone.com/svalkanov) for the report and patch!
7.1.3.1
Affected by 4 other vulnerabilities.
VCID-g3rk-djae-pkeh
Aliases:
CVE-2024-54133
GHSA-vfm5-rmrh-j26v
Possible Content Security Policy bypass in Action Dispatch There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack. Impact ------ Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input. Credits ------- Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
7.0.8.7
Affected by 0 other vulnerabilities.
7.1.0.beta1
Affected by 4 other vulnerabilities.
7.1.5.1
Affected by 0 other vulnerabilities.
7.2.0.beta1
Affected by 4 other vulnerabilities.
7.2.2.1
Affected by 0 other vulnerabilities.
8.0.0.beta1
Affected by 3 other vulnerabilities.
8.0.0.1
Affected by 0 other vulnerabilities.
VCID-gjey-bqtd-kqa1
Aliases:
CVE-2021-22885
GHSA-hjg4-8q5f-x6fm
Action Pack contains Information Disclosure / Unintended Method Execution vulnerability Impact ------ There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input. Vulnerable code will look like this. ``` redirect_to(params[:some_param]) ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The FIXED releases are available at the normal locations. Workarounds ----------- To work around this problem, it is recommended to use an allow list for valid parameters passed from the user. For example, ```ruby private def check(param) case param when "valid" param else "/" end end def index redirect_to(check(params[:some_param])) end ``` Or force the user input to be cast to a string like this, ```ruby def index redirect_to(params[:some_param].to_s) end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-information-disclosure.patch - Patch for 5.2 series * 6-0-information-disclosure.patch - Patch for 6.0 series * 6-1-information-disclosure.patch - Patch for 6.1 series Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to Benoit Côté-Jodoin from Shopify for reporting this.
5.2.4.6
Affected by 11 other vulnerabilities.
5.2.6
Affected by 11 other vulnerabilities.
6.0.3.7
Affected by 13 other vulnerabilities.
6.1.3.1
Affected by 17 other vulnerabilities.
6.1.3.2
Affected by 13 other vulnerabilities.
VCID-hppf-a715-r7b2
Aliases:
CVE-2023-22795
GHSA-8xww-x3g3-6jcv
GMS-2023-56
ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
5.2.8
Affected by 7 other vulnerabilities.
6.1.7.1
Affected by 8 other vulnerabilities.
7.0.4.1
Affected by 9 other vulnerabilities.
VCID-jwun-grgg-2uet
Aliases:
CVE-2022-23633
CVE-2022-23634
GHSA-rmj8-8hhh-gv5h
GHSA-wh98-p28r-vrc9
Exposure of information in Action Pack Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests. This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
5.2.6.2
Affected by 9 other vulnerabilities.
6.0.0.beta1
Affected by 9 other vulnerabilities.
6.0.4.6
Affected by 9 other vulnerabilities.
6.1.0.rc1
Affected by 8 other vulnerabilities.
6.1.4.6
Affected by 10 other vulnerabilities.
7.0.0.alpha1
Affected by 6 other vulnerabilities.
7.0.2.2
Affected by 12 other vulnerabilities.
VCID-mnkw-23eu-bkgc
Aliases:
CVE-2020-8166
GHSA-jp5v-5gx4-jmj9
Ability to forge per-form CSRF tokens in Rails It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session. Impact ------ Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.
5.2.4.3
Affected by 14 other vulnerabilities.
6.0.3.1
Affected by 19 other vulnerabilities.
VCID-msda-xqbp-qfdd
Aliases:
CVE-2021-22903
GHSA-5hq2-xf89-9jxq
Possible Open Redirect Vulnerability in Action Pack There is a possible Open Redirect Vulnerability in Action Pack. Versions Affected: >= v6.1.0.rc2 Not affected: < v6.1.0.rc2 Fixed Versions: 6.1.3.2 Impact ------ This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch put in an initializer can be used as a workaround. ```ruby class ActionDispatch::HostAuthorization::Permissions def sanitize_string(host) if host.start_with?(".") /\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i else /\A#{Regexp.escape host}\z/i end end end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-1-open-redirect.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!
6.1.3.2
Affected by 13 other vulnerabilities.
VCID-p5mc-r1rg-5ff7
Aliases:
CVE-2022-27777
GHSA-ch3h-j2vf-95pv
GMS-2022-1138
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in actionview.
5.2.7.1
Affected by 7 other vulnerabilities.
6.0.4.8
Affected by 7 other vulnerabilities.
6.1.5.1
Affected by 8 other vulnerabilities.
7.0.2.4
Affected by 10 other vulnerabilities.
VCID-sfyc-jewr-wuf5
Aliases:
CVE-2024-47887
GHSA-vfg9-r3fq-jvx4
Possible ReDoS vulnerability in HTTP Token authentication in Action Controller There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887. Impact ------ For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for reporting
6.1.7.9
Affected by 1 other vulnerability.
7.0.0.alpha1
Affected by 6 other vulnerabilities.
7.0.8.5
Affected by 1 other vulnerability.
7.1.0.beta1
Affected by 4 other vulnerabilities.
7.1.4.1
Affected by 1 other vulnerability.
7.2.0.beta1
Affected by 4 other vulnerabilities.
7.2.1.1
Affected by 1 other vulnerability.
8.0.0.beta1
Affected by 3 other vulnerabilities.
VCID-sgdb-985e-4uej
Aliases:
CVE-2024-41128
GHSA-x76w-6vjr-8xgj
Possible ReDoS vulnerability in query parameter filtering in Action Dispatch There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128. Impact ------ Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!
6.1.7.9
Affected by 1 other vulnerability.
7.0.0.alpha1
Affected by 6 other vulnerabilities.
7.0.8.5
Affected by 1 other vulnerability.
7.1.0.beta1
Affected by 4 other vulnerabilities.
7.1.4.1
Affected by 1 other vulnerability.
7.2.0.beta1
Affected by 4 other vulnerabilities.
7.2.1.1
Affected by 1 other vulnerability.
8.0.0.beta1
Affected by 3 other vulnerabilities.
VCID-wg3a-j2dp-ayh4
Aliases:
CVE-2021-22904
GHSA-7wjx-3g7j-8584
Possible DoS Vulnerability in Action Controller Token Authentication There is a possible DoS vulnerability in the Token Authentication logic in Action Controller. Versions Affected: >= 4.0.0 Not affected: < 4.0.0 Fixed Versions: 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 Impact ------ Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this: ``` class PostsController < ApplicationController before_action :authenticate private def authenticate authenticate_or_request_with_http_token do |token, options| # ... end end end ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch placed in an initializer can be used to work around the issue: ```ruby module ActionController::HttpAuthentication::Token AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/ end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-http-authentication-dos.patch - Patch for 5.2 series * 6-0-http-authentication-dos.patch - Patch for 6.0 series * 6-1-http-authentication-dos.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue!
5.2.4.6
Affected by 11 other vulnerabilities.
5.2.6
Affected by 11 other vulnerabilities.
6.0.3.7
Affected by 13 other vulnerabilities.
6.1.3.2
Affected by 13 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T17:41:15.222885+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.4.0
2026-04-16T17:41:10.939424+00:00 Ruby Importer Affected by VCID-sgdb-985e-4uej https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-41128.yml 38.4.0
2026-04-16T17:41:03.394553+00:00 Ruby Importer Affected by VCID-sfyc-jewr-wuf5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-47887.yml 38.4.0
2026-04-16T17:40:54.077839+00:00 Ruby Importer Affected by VCID-ehbj-aezy-d7h4 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml 38.4.0
2026-04-16T17:39:54.995968+00:00 Ruby Importer Affected by VCID-63gy-6njy-kbd8 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.yml 38.4.0
2026-04-16T17:39:50.621333+00:00 Ruby Importer Affected by VCID-hppf-a715-r7b2 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml 38.4.0
2026-04-12T00:35:40.342457+00:00 GitLab Importer Affected by VCID-g3rk-djae-pkeh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-54133.yml 38.3.0
2026-04-12T00:30:22.456027+00:00 GitLab Importer Affected by VCID-sfyc-jewr-wuf5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-47887.yml 38.3.0
2026-04-12T00:30:20.520181+00:00 GitLab Importer Affected by VCID-sgdb-985e-4uej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-41128.yml 38.3.0
2026-04-11T23:51:34.966364+00:00 GitLab Importer Affected by VCID-dd9p-x7k3-37ea https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2023-28362.yml 38.3.0
2026-04-11T23:39:25.517140+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/GMS-2023-56.yml 38.3.0
2026-04-11T23:37:55.768881+00:00 GitLab Importer Affected by VCID-63gy-6njy-kbd8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/GMS-2023-58.yml 38.3.0
2026-04-11T23:18:19.245996+00:00 GitLab Importer Affected by VCID-ce39-j83r-6ug9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-22577.yml 38.3.0
2026-04-11T23:18:18.744711+00:00 GitLab Importer Affected by VCID-p5mc-r1rg-5ff7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-27777.yml 38.3.0
2026-04-11T22:55:32.103757+00:00 GitLab Importer Affected by VCID-jwun-grgg-2uet https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-23633.yml 38.3.0
2026-04-11T22:38:59.392979+00:00 GitLab Importer Affected by VCID-wg3a-j2dp-ayh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22904.yml 38.3.0
2026-04-11T22:38:57.667846+00:00 GitLab Importer Affected by VCID-msda-xqbp-qfdd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22903.yml 38.3.0
2026-04-11T22:38:11.612467+00:00 GitLab Importer Affected by VCID-gjey-bqtd-kqa1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22885.yml 38.3.0
2026-04-11T22:16:39.552769+00:00 GitLab Importer Affected by VCID-1xgz-hwng-n3eq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8185.yml 38.3.0
2026-04-11T22:16:37.910182+00:00 GitLab Importer Affected by VCID-mnkw-23eu-bkgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8166.yml 38.3.0
2026-04-11T22:16:08.771709+00:00 GitLab Importer Affected by VCID-a6sp-18av-wya6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8164.yml 38.3.0
2026-04-11T21:38:53.038166+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.3.0
2026-04-11T21:38:44.319727+00:00 Ruby Importer Affected by VCID-sgdb-985e-4uej https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-41128.yml 38.3.0
2026-04-11T21:38:27.696835+00:00 Ruby Importer Affected by VCID-sfyc-jewr-wuf5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-47887.yml 38.3.0
2026-04-11T21:38:12.828940+00:00 Ruby Importer Affected by VCID-ehbj-aezy-d7h4 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml 38.3.0
2026-04-11T21:37:05.573446+00:00 Ruby Importer Affected by VCID-63gy-6njy-kbd8 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.yml 38.3.0
2026-04-11T21:37:00.952363+00:00 Ruby Importer Affected by VCID-hppf-a715-r7b2 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml 38.3.0
2026-04-03T00:43:26.983177+00:00 GitLab Importer Affected by VCID-g3rk-djae-pkeh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-54133.yml 38.1.0
2026-04-03T00:38:01.836512+00:00 GitLab Importer Affected by VCID-sfyc-jewr-wuf5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-47887.yml 38.1.0
2026-04-03T00:38:00.189923+00:00 GitLab Importer Affected by VCID-sgdb-985e-4uej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-41128.yml 38.1.0
2026-04-02T23:54:49.589172+00:00 GitLab Importer Affected by VCID-dd9p-x7k3-37ea https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2023-28362.yml 38.1.0
2026-04-02T23:43:36.759934+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/GMS-2023-56.yml 38.1.0
2026-04-02T23:42:13.555446+00:00 GitLab Importer Affected by VCID-63gy-6njy-kbd8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/GMS-2023-58.yml 38.1.0
2026-04-02T23:25:54.679625+00:00 GitLab Importer Affected by VCID-ce39-j83r-6ug9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-22577.yml 38.1.0
2026-04-02T23:25:54.237664+00:00 GitLab Importer Affected by VCID-p5mc-r1rg-5ff7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-27777.yml 38.1.0
2026-04-02T23:04:36.971643+00:00 GitLab Importer Affected by VCID-jwun-grgg-2uet https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-23633.yml 38.1.0
2026-04-02T22:49:36.188142+00:00 GitLab Importer Affected by VCID-wg3a-j2dp-ayh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22904.yml 38.1.0
2026-04-02T22:49:34.693064+00:00 GitLab Importer Affected by VCID-msda-xqbp-qfdd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22903.yml 38.1.0
2026-04-02T22:48:53.523487+00:00 GitLab Importer Affected by VCID-gjey-bqtd-kqa1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22885.yml 38.1.0
2026-04-02T22:28:48.610109+00:00 GitLab Importer Affected by VCID-1xgz-hwng-n3eq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8185.yml 38.1.0
2026-04-02T22:28:47.157500+00:00 GitLab Importer Affected by VCID-mnkw-23eu-bkgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8166.yml 38.1.0
2026-04-02T22:28:19.223428+00:00 GitLab Importer Affected by VCID-a6sp-18av-wya6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8164.yml 38.1.0
2026-04-02T19:36:40.395405+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.1.0
2026-04-02T19:36:35.613634+00:00 Ruby Importer Affected by VCID-sgdb-985e-4uej https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-41128.yml 38.1.0
2026-04-02T19:36:22.998181+00:00 Ruby Importer Affected by VCID-sfyc-jewr-wuf5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-47887.yml 38.1.0
2026-04-02T19:36:11.183407+00:00 Ruby Importer Affected by VCID-ehbj-aezy-d7h4 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml 38.1.0
2026-04-02T19:35:11.092639+00:00 Ruby Importer Affected by VCID-63gy-6njy-kbd8 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.yml 38.1.0
2026-04-02T19:35:07.165979+00:00 Ruby Importer Affected by VCID-hppf-a715-r7b2 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml 38.1.0
2026-04-01T18:06:30.508489+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/GMS-2023-56.yml 38.0.0
2026-04-01T18:04:56.552470+00:00 GitLab Importer Affected by VCID-63gy-6njy-kbd8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/GMS-2023-58.yml 38.0.0
2026-04-01T17:46:44.972672+00:00 GitLab Importer Affected by VCID-ce39-j83r-6ug9 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-22577.yml 38.0.0
2026-04-01T17:46:44.490020+00:00 GitLab Importer Affected by VCID-p5mc-r1rg-5ff7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-27777.yml 38.0.0
2026-04-01T17:23:33.148806+00:00 GitLab Importer Affected by VCID-jwun-grgg-2uet https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2022-23633.yml 38.0.0
2026-04-01T17:07:31.467939+00:00 GitLab Importer Affected by VCID-wg3a-j2dp-ayh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22904.yml 38.0.0
2026-04-01T17:07:29.787417+00:00 GitLab Importer Affected by VCID-msda-xqbp-qfdd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22903.yml 38.0.0
2026-04-01T17:06:45.351757+00:00 GitLab Importer Affected by VCID-gjey-bqtd-kqa1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2021-22885.yml 38.0.0
2026-04-01T16:46:49.278031+00:00 GitLab Importer Affected by VCID-1xgz-hwng-n3eq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8185.yml 38.0.0
2026-04-01T16:46:47.625164+00:00 GitLab Importer Affected by VCID-mnkw-23eu-bkgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8166.yml 38.0.0
2026-04-01T16:46:16.563213+00:00 GitLab Importer Affected by VCID-a6sp-18av-wya6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2020-8164.yml 38.0.0
2026-04-01T15:54:00.323133+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.0.0
2026-04-01T15:53:51.108779+00:00 Ruby Importer Affected by VCID-sgdb-985e-4uej https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-41128.yml 38.0.0
2026-04-01T15:53:35.548304+00:00 Ruby Importer Affected by VCID-sfyc-jewr-wuf5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-47887.yml 38.0.0
2026-04-01T15:53:21.847911+00:00 Ruby Importer Affected by VCID-ehbj-aezy-d7h4 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml 38.0.0
2026-04-01T15:52:13.389034+00:00 Ruby Importer Affected by VCID-63gy-6njy-kbd8 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22792.yml 38.0.0
2026-04-01T15:52:08.902426+00:00 Ruby Importer Affected by VCID-hppf-a715-r7b2 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-22795.yml 38.0.0