7.5

CVE-2016-0751

actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.

Data is provided by the National Vulnerability Database (NVD)
RubyonrailsRails Version4.0.0 Update-
RubyonrailsRails Version4.0.0 Updatebeta
RubyonrailsRails Version4.0.0 Updaterc1
RubyonrailsRails Version4.0.0 Updaterc2
RubyonrailsRails Version4.0.1 Update-
RubyonrailsRails Version4.0.1 Updaterc1
RubyonrailsRails Version4.0.1 Updaterc2
RubyonrailsRails Version4.0.1 Updaterc3
RubyonrailsRails Version4.0.1 Updaterc4
RubyonrailsRails Version4.0.2
RubyonrailsRails Version4.0.3
RubyonrailsRails Version4.0.4
RubyonrailsRails Version4.0.5
RubyonrailsRails Version4.0.6
RubyonrailsRails Version4.0.6 Updaterc1
RubyonrailsRails Version4.0.6 Updaterc2
RubyonrailsRails Version4.0.6 Updaterc3
RubyonrailsRails Version4.0.7
RubyonrailsRails Version4.0.8
RubyonrailsRails Version4.0.9
RubyonrailsRails Version4.0.10
RubyonrailsRails Version4.0.10 Updaterc1
RubyonrailsRails Version4.1.0 Update-
RubyonrailsRails Version4.1.0 Updatebeta1
RubyonrailsRails Version4.1.1
RubyonrailsRails Version4.1.2
RubyonrailsRails Version4.1.2 Updaterc1
RubyonrailsRails Version4.1.2 Updaterc2
RubyonrailsRails Version4.1.2 Updaterc3
RubyonrailsRails Version4.1.3
RubyonrailsRails Version4.1.4
RubyonrailsRails Version4.1.5
RubyonrailsRails Version4.1.6 Updaterc1
RubyonrailsRails Version4.1.7
RubyonrailsRails Version4.1.8
RubyonrailsRails Version4.1.9
RubyonrailsRails Version4.1.10
RubyonrailsRails Version4.1.12
RubyonrailsRails Version4.1.13
RubyonrailsRails Version4.2.0 Updatebeta1
RubyonrailsRails Version4.2.0 Updatebeta2
RubyonrailsRails Version4.2.0 Updatebeta3
RubyonrailsRails Version4.2.0 Updatebeta4
RubyonrailsRails Version4.2.0 Updaterc1
RubyonrailsRails Version4.2.0 Updaterc2
RubyonrailsRails Version4.2.0 Updaterc3
RubyonrailsRails Version4.2.1
RubyonrailsRails Version4.2.1 Updaterc1
RubyonrailsRails Version4.2.1 Updaterc2
RubyonrailsRails Version4.2.1 Updaterc3
RubyonrailsRails Version4.2.1 Updaterc4
RubyonrailsRails Version4.2.2
RubyonrailsRails Version4.2.3
RubyonrailsRails Version4.2.3 Updaterc1
RubyonrailsRails Version4.2.4
RubyonrailsRails Version4.2.4 Updaterc1
RubyonrailsRails Version4.2.5
RubyonrailsRails Version4.2.5 Updaterc1
RubyonrailsRails Version4.2.5 Updaterc2
RubyonrailsRails Version5.0.0 Updatebeta1
RubyonrailsRuby On Rails Version <= 3.2.22
RubyonrailsRuby On Rails Version4.0.10 Updaterc2
RubyonrailsRuby On Rails Version4.0.11
RubyonrailsRuby On Rails Version4.0.11.1
RubyonrailsRuby On Rails Version4.0.12
RubyonrailsRuby On Rails Version4.0.13
RubyonrailsRuby On Rails Version4.0.13 Updaterc1
RubyonrailsRuby On Rails Version4.1.11
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 6.15% 0.904
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P