CVE-2025-27219
- EPSS 0.47%
- Veröffentlicht 04.03.2025 00:15:31
- Zuletzt bearbeitet 05.03.2025 14:05:15
In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight ...
CVE-2025-27220
- EPSS 0.34%
- Veröffentlicht 04.03.2025 00:15:31
- Zuletzt bearbeitet 05.03.2025 14:05:49
In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.
CVE-2021-33621
- EPSS 2.49%
- Veröffentlicht 18.11.2022 23:15:18
- Zuletzt bearbeitet 21.11.2024 06:09:12
The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
CVE-2021-41816
- EPSS 0.91%
- Veröffentlicht 06.02.2022 21:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:48
CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem befo...
CVE-2021-41819
- EPSS 0.88%
- Veröffentlicht 01.01.2022 06:15:07
- Zuletzt bearbeitet 22.05.2025 15:15:54
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.