Логотип exploitDog
bind: "CVE-2023-22795"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-22795"

Количество 9

Количество 9

ubuntu логотип

CVE-2023-22795

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-22795

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-22795

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-22795

больше 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-22795

больше 2 лет назад

A regular expression based DoS vulnerability in Action Dispatch <6.1.7 ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8xww-x3g3-6jcv

больше 2 лет назад

ReDoS based DoS vulnerability in Action Dispatch

EPSS: Низкий
fstec логотип

BDU:2025-01401

больше 2 лет назад

Уязвимость компонента Action Dispatch программной платформы Ruby on Rails, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0444-1

больше 2 лет назад

Security update for rubygem-actionpack-5_1

EPSS: Низкий
redos логотип

ROS-20250203-14

5 месяцев назад

Множественные уязвимости rubygem-actionpack

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-22795

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-22795

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-22795

A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-22795

A regular expression based DoS vulnerability in Action Dispatch <6.1.7 ...

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-8xww-x3g3-6jcv

ReDoS based DoS vulnerability in Action Dispatch

1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2025-01401

Уязвимость компонента Action Dispatch программной платформы Ruby on Rails, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0444-1

Security update for rubygem-actionpack-5_1

больше 2 лет назад
redos логотип
ROS-20250203-14

Множественные уязвимости rubygem-actionpack

CVSS3: 7.5
5 месяцев назад

Уязвимостей на страницу