| 0 |
| url |
VCID-1rxp-g9rz-4yb3 |
| vulnerability_id |
VCID-1rxp-g9rz-4yb3 |
| summary |
Possible XSS Security Vulnerability in SafeBuffer#bytesplice
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
This vulnerability has been assigned the CVE identifier CVE-2023-28120.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.4.3, 6.1.7.3
# Impact
ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized.
When these strings are mutated, the tag is should be removed to mark them as no longer being html_safe.
Ruby 3.2 introduced a new bytesplice method which ActiveSupport does not yet understand to be a mutation.
Users on older versions of Ruby are likely unaffected.
All users running an affected release and using bytesplice should either upgrade or use one of the workarounds immediately.
# Workarounds
Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60317 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60411 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60389 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60403 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60323 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60366 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60349 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60402 |
| published_at |
2026-05-07T12:55:00Z |
|
| 10 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60356 |
| published_at |
2026-05-05T12:55:00Z |
|
| 11 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60397 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60409 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60394 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 15 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61162 |
| published_at |
2026-05-12T12:55:00Z |
|
| 16 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61135 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.61173 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00406 |
| scoring_system |
epss |
| scoring_elements |
0.6122 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28120 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28120, GHSA-pj73-v5mw-pm9j, GMS-2023-765
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1rxp-g9rz-4yb3 |
|
| 1 |
| url |
VCID-3zdr-vasc-a7cn |
| vulnerability_id |
VCID-3zdr-vasc-a7cn |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3009 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.82105 |
| published_at |
2026-05-15T12:55:00Z |
|
| 1 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81902 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81937 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81938 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81939 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81962 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81973 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81978 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81998 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.82018 |
| published_at |
2026-05-07T12:55:00Z |
|
| 11 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.82043 |
| published_at |
2026-05-09T12:55:00Z |
|
| 12 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.8204 |
| published_at |
2026-05-11T12:55:00Z |
|
| 13 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.82057 |
| published_at |
2026-05-12T12:55:00Z |
|
| 14 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.82098 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81837 |
| published_at |
2026-04-01T12:55:00Z |
|
| 16 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81848 |
| published_at |
2026-04-02T12:55:00Z |
|
| 17 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.8187 |
| published_at |
2026-04-04T12:55:00Z |
|
| 18 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81866 |
| published_at |
2026-04-07T12:55:00Z |
|
| 19 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 20 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 21 |
| value |
0.01632 |
| scoring_system |
epss |
| scoring_elements |
0.81919 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3009 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3009, GHSA-8qrh-h9m2-5fvf, OSV-57666
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3zdr-vasc-a7cn |
|
| 2 |
| url |
VCID-43f3-rxwm-fkgv |
| vulnerability_id |
VCID-43f3-rxwm-fkgv |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74434 |
| published_at |
2026-05-15T12:55:00Z |
|
| 1 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74293 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74303 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74295 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74327 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74337 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74335 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74332 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74361 |
| published_at |
2026-05-07T12:55:00Z |
|
| 10 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74385 |
| published_at |
2026-05-09T12:55:00Z |
|
| 11 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7435 |
| published_at |
2026-05-11T12:55:00Z |
|
| 12 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74373 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74428 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74208 |
| published_at |
2026-04-01T12:55:00Z |
|
| 15 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 16 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 17 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74213 |
| published_at |
2026-04-07T12:55:00Z |
|
| 18 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74246 |
| published_at |
2026-04-08T12:55:00Z |
|
| 19 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.7426 |
| published_at |
2026-04-09T12:55:00Z |
|
| 20 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74282 |
| published_at |
2026-04-11T12:55:00Z |
|
| 21 |
| value |
0.00813 |
| scoring_system |
epss |
| scoring_elements |
0.74263 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2932 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2932, GHSA-9fh3-vh3h-q4g3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-43f3-rxwm-fkgv |
|
| 3 |
| url |
VCID-4tzv-1t1b-t3g3 |
| vulnerability_id |
VCID-4tzv-1t1b-t3g3 |
| summary |
Rails Active Support has a possible ReDoS vulnerability in number_to_delimited
### Impact
`NumberToDelimitedConverter` used a regular expression with `gsub!` to insert thousands delimiters. This could produce quadratic time complexity on long digit strings.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0484 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04811 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04803 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04855 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04874 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04894 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04858 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0578 |
| published_at |
2026-05-12T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05776 |
| published_at |
2026-05-11T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05765 |
| published_at |
2026-05-09T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05678 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05624 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05617 |
| published_at |
2026-04-29T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05616 |
| published_at |
2026-04-26T12:55:00Z |
|
| 18 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0558 |
| published_at |
2026-04-24T12:55:00Z |
|
| 19 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05786 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33169, GHSA-cg4j-q9v8-6v38
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4tzv-1t1b-t3g3 |
|
| 4 |
| url |
VCID-5tky-d2en-u7c7 |
| vulnerability_id |
VCID-5tky-d2en-u7c7 |
| summary |
Rails Active Support has a possible XSS vulnerability in SafeBuffer#%
### Impact
`SafeBuffer#%` does not propagate the `@html_unsafe` flag to the newly created buffer. If a `SafeBuffer` is mutated in place (e.g. via `gsub!`) and then formatted with `%` using untrusted arguments, the result incorrectly reports `html_safe? == true`, bypassing ERB auto-escaping and possibly leading to XSS.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0109 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0108 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01085 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01094 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02201 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.022 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02255 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02169 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02821 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02849 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02791 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02804 |
| published_at |
2026-04-24T12:55:00Z |
|
| 18 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02837 |
| published_at |
2026-05-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33170 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33170, GHSA-89vf-4333-qx8v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5tky-d2en-u7c7 |
|
| 5 |
| url |
VCID-6ku5-mtgz-zygw |
| vulnerability_id |
VCID-6ku5-mtgz-zygw |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81201 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81159 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81141 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81146 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81123 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81101 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81087 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81079 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81049 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01484 |
| scoring_system |
epss |
| scoring_elements |
0.81071 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.8242 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82406 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82448 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82454 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82473 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 17 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 18 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.825 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22796 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22796, GHSA-j6gc-792m-qgm2, GMS-2023-61
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ku5-mtgz-zygw |
|
| 6 |
| url |
VCID-6r5v-h4kr-zqen |
| vulnerability_id |
VCID-6r5v-h4kr-zqen |
| summary |
Moderate severity vulnerability that affects activesupport
Withdrawn, accidental duplicate publish.
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-35c4-f3rq-f9g3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6r5v-h4kr-zqen |
|
| 7 |
| url |
VCID-7f5r-9h1g-nuch |
| vulnerability_id |
VCID-7f5r-9h1g-nuch |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68358 |
| published_at |
2026-05-15T12:55:00Z |
|
| 1 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68147 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68185 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68179 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68222 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68231 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68236 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68211 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68256 |
| published_at |
2026-05-07T12:55:00Z |
|
| 10 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68293 |
| published_at |
2026-05-09T12:55:00Z |
|
| 11 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68258 |
| published_at |
2026-05-11T12:55:00Z |
|
| 12 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68286 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68345 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68084 |
| published_at |
2026-04-01T12:55:00Z |
|
| 15 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 16 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68125 |
| published_at |
2026-04-04T12:55:00Z |
|
| 17 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68102 |
| published_at |
2026-04-07T12:55:00Z |
|
| 18 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 19 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 20 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 21 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.6818 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3086 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3086, GHSA-fg9w-g6m4-557j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7f5r-9h1g-nuch |
|
| 8 |
| url |
VCID-ed3f-3bxh-eba4 |
| vulnerability_id |
VCID-ed3f-3bxh-eba4 |
| summary |
activesupport vulnerable to Denial of Service via large XML document depth
The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 3.2.22, 4.1.x before 4.1.11, and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.86001 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85873 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85865 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85887 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85896 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85897 |
| published_at |
2026-04-29T12:55:00Z |
|
| 6 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85915 |
| published_at |
2026-05-05T12:55:00Z |
|
| 7 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85937 |
| published_at |
2026-05-07T12:55:00Z |
|
| 8 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85955 |
| published_at |
2026-05-09T12:55:00Z |
|
| 9 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85954 |
| published_at |
2026-05-11T12:55:00Z |
|
| 10 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85967 |
| published_at |
2026-05-12T12:55:00Z |
|
| 11 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85776 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85807 |
| published_at |
2026-04-04T12:55:00Z |
|
| 14 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 15 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 16 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85841 |
| published_at |
2026-04-09T12:55:00Z |
|
| 17 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85856 |
| published_at |
2026-04-11T12:55:00Z |
|
| 18 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85853 |
| published_at |
2026-04-12T12:55:00Z |
|
| 19 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 20 |
| value |
0.02683 |
| scoring_system |
epss |
| scoring_elements |
0.85868 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3227 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3227, GHSA-j96r-xvjq-r9pg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ed3f-3bxh-eba4 |
|
| 9 |
| url |
VCID-j24x-nhsb-yug6 |
| vulnerability_id |
VCID-j24x-nhsb-yug6 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63447 |
| published_at |
2026-05-15T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63333 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63331 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63299 |
| published_at |
2026-05-05T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63344 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63396 |
| published_at |
2026-05-09T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63357 |
| published_at |
2026-05-11T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63383 |
| published_at |
2026-05-12T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63438 |
| published_at |
2026-05-14T12:55:00Z |
|
| 9 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6319 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63249 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63295 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63313 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6333 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63314 |
| published_at |
2026-04-16T12:55:00Z |
|
| 17 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 18 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63301 |
| published_at |
2026-04-21T12:55:00Z |
|
| 19 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6332 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2197 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2197, GHSA-v9v4-7jp6-8c73
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j24x-nhsb-yug6 |
|
| 10 |
| url |
VCID-sarm-n22v-akcm |
| vulnerability_id |
VCID-sarm-n22v-akcm |
| summary |
Rails Active Support has a possible DoS vulnerability in its number helpers
### Impact
Active Support number helpers accept strings containing scientific notation (e.g. `1e10000`), which when converted to a string could be expanded into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability.
### Releases
The fixed releases are available at the normal locations. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33176 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05678 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05699 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05712 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05706 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05668 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05813 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0636 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06349 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06323 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06492 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06376 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08897 |
| published_at |
2026-05-14T12:55:00Z |
|
| 17 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08815 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08849 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0884 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33176 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33176, GHSA-2j26-frm8-cmj9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sarm-n22v-akcm |
|
| 11 |
| url |
VCID-t2cx-7ycd-tqhq |
| vulnerability_id |
VCID-t2cx-7ycd-tqhq |
| summary |
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43541 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43622 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43625 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43543 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43414 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43489 |
| published_at |
2026-05-07T12:55:00Z |
|
| 6 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43508 |
| published_at |
2026-05-09T12:55:00Z |
|
| 7 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43444 |
| published_at |
2026-05-11T12:55:00Z |
|
| 8 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43477 |
| published_at |
2026-05-12T12:55:00Z |
|
| 9 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.4366 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43716 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43741 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43674 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43725 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43748 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43699 |
| published_at |
2026-04-13T12:55:00Z |
|
| 17 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43761 |
| published_at |
2026-04-16T12:55:00Z |
|
| 18 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43752 |
| published_at |
2026-04-18T12:55:00Z |
|
| 19 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43684 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3226 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3226, GHSA-vxvp-4xwc-jpp6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2cx-7ycd-tqhq |
|