Логотип exploitDog
bind: "CVE-2023-22792"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-22792"

Количество 8

Количество 8

ubuntu логотип

CVE-2023-22792

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-22792

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-22792

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-22792

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.0.6 ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-p84v-45xj-wwqj

больше 2 лет назад

ReDoS based DoS vulnerability in Action Dispatch

EPSS: Низкий
fstec логотип

BDU:2025-01402

больше 2 лет назад

Уязвимость компонента Action Dispatch программной платформы Ruby on Rails, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0444-1

больше 2 лет назад

Security update for rubygem-actionpack-5_1

EPSS: Низкий
redos логотип

ROS-20250203-14

5 месяцев назад

Множественные уязвимости rubygem-actionpack

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-22792

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
2%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-22792

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
2%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-22792

A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
2%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-22792

A regular expression based DoS vulnerability in Action Dispatch <6.0.6 ...

CVSS3: 7.5
2%
Низкий
больше 2 лет назад
github логотип
GHSA-p84v-45xj-wwqj

ReDoS based DoS vulnerability in Action Dispatch

2%
Низкий
больше 2 лет назад
fstec логотип
BDU:2025-01402

Уязвимость компонента Action Dispatch программной платформы Ruby on Rails, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
2%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0444-1

Security update for rubygem-actionpack-5_1

больше 2 лет назад
redos логотип
ROS-20250203-14

Множественные уязвимости rubygem-actionpack

CVSS3: 7.5
5 месяцев назад

Уязвимостей на страницу