Количество 8
Количество 8

CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.
CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7. ...

SUSE-SU-2023:0275-1
Security update for rubygem-activesupport-5_1

ROS-20250203-15
Уязвимость rubygem-activesupport
GHSA-j6gc-792m-qgm2
ReDoS based DoS vulnerability in Active Support's underscore

BDU:2025-01403
Уязвимость компонента Active Support PostgreSQL интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад |
![]() | CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад |
![]() | CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад |
CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7. ... | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0275-1 Security update for rubygem-activesupport-5_1 | 1% Низкий | больше 2 лет назад | |
![]() | ROS-20250203-15 Уязвимость rubygem-activesupport | CVSS3: 7.5 | 1% Низкий | 5 месяцев назад |
GHSA-j6gc-792m-qgm2 ReDoS based DoS vulnerability in Active Support's underscore | 1% Низкий | больше 2 лет назад | ||
![]() | BDU:2025-01403 Уязвимость компонента Active Support PostgreSQL интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад |
Уязвимостей на страницу