Количество 8
Количество 8
GHSA-j6gc-792m-qgm2
ReDoS based DoS vulnerability in Active Support's underscore
CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.
CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.
CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.
CVE-2023-22796
A regular expression based DoS vulnerability in Active Support <6.1.7. ...
SUSE-SU-2023:0275-1
Security update for rubygem-activesupport-5_1
BDU:2025-01403
Уязвимость компонента Active Support PostgreSQL интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20250203-15
Уязвимость rubygem-activesupport
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-j6gc-792m-qgm2 ReDoS based DoS vulnerability in Active Support's underscore | 1% Низкий | около 3 лет назад | ||
CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-22796 A regular expression based DoS vulnerability in Active Support <6.1.7. ... | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
SUSE-SU-2023:0275-1 Security update for rubygem-activesupport-5_1 | 1% Низкий | почти 3 года назад | ||
BDU:2025-01403 Уязвимость компонента Active Support PostgreSQL интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | почти 3 года назад | |
ROS-20250203-15 Уязвимость rubygem-activesupport | CVSS3: 7.5 | 1% Низкий | 12 месяцев назад |
Уязвимостей на страницу