CVE-2024-47889
- EPSS 0.36%
- Published 16.10.2024 21:15:13
- Last modified 18.10.2024 12:53:04
Action Mailer is a framework for designing email service layers. Starting in version 3.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the block_format helper in Action Mailer. Carefully cr...
CVE-2024-47887
- EPSS 0.49%
- Published 16.10.2024 20:15:06
- Last modified 18.10.2024 12:53:04
Action Pack is a framework for handling and responding to web requests. Starting in version 4.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. ...
CVE-2024-32464
- EPSS 0.27%
- Published 04.06.2024 20:15:11
- Last modified 21.11.2024 09:14:58
Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.
CVE-2024-28103
- EPSS 0.67%
- Published 04.06.2024 20:15:10
- Last modified 06.12.2024 14:15:20
Action Pack is a framework for handling and responding to web requests. Since 6.1.0, the application configurable Permissions-Policy is only served on responses with an HTML related Content-Type. This vulnerability is fixed in 6.1.7.8, 7.0.8.2, and ...
CVE-2024-26142
- EPSS 2.08%
- Published 27.02.2024 16:15:46
- Last modified 14.02.2025 16:22:23
Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability is patched in 7.1.3.1. Ruby 3.2 has mitigations for this problem, so...
CVE-2024-26143
- EPSS 1.54%
- Published 27.02.2024 16:15:46
- Last modified 13.02.2025 17:13:21
Rails is a web-application framework. There is a possible XSS vulnerability when using the translation helpers in Action Controller. Applications using translation methods like translate, or t on a controller, with a key ending in "_html", a :default...
CVE-2024-26144
- EPSS 2.31%
- Published 27.02.2024 16:15:46
- Last modified 14.02.2025 15:26:42
Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs....
CVE-2023-22792
- EPSS 2.36%
- Published 09.02.2023 20:15:11
- Last modified 24.03.2025 21:15:16
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of c...
CVE-2023-22795
- EPSS 1.36%
- Published 09.02.2023 20:15:11
- Last modified 21.11.2024 07:45:26
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtrac...
CVE-2023-22797
- EPSS 0.12%
- Published 09.02.2023 20:15:11
- Last modified 24.03.2025 20:15:16
An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. Howeve...