File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -14,12 +14,15 @@ description: |
1414 ranges in an HTTP Range header. A request with thousands of small
1515 ranges causes disproportionate CPU usage compared to a normal
1616 request for the same file, possibly resulting in a DoS vulnerability.
17+ cvss_v3 : 6.5
18+ cvss_v4 : 2.3
1719patched_versions :
1820 - " ~> 7.2.3, >= 7.2.3.1"
1921 - " ~> 8.0.4, >= 8.0.4.1"
2022 - " >= 8.1.2.1"
2123related :
2224 url :
25+ - https://nvd.nist.gov/vuln/detail/CVE-2026-33658
2326 - https://discuss.rubyonrails.org/t/cve-2026-33658-possible-dos-vulnerability-in-active-storage-proxy-mode-via-multi-range-requests/90906
2427 - https://rubyonrails.org/2026/3/23/Rails-Versions-7-2-3-1-8-0-4-1-and-8-1-2-1-have-been-released
2528 - https://github.com/rails/rails/commit/85ec5b1e00d3197d8c69a5e622e1b398a1b10b06.patch
Original file line number Diff line number Diff line change @@ -20,6 +20,7 @@ description: |
2020 access sensitive files such as /etc/passwd. This issue represents a
2121 bypass of the incomplete fix for CVE-2024-46987 and affects
2222 deployments using the AWS S3 storage backend.
23+ cvss_v3 : 6.5
2324cvss_v4 : 6.0
2425unaffected_versions :
2526 - " < 2.4.5.0"
Original file line number Diff line number Diff line change @@ -31,11 +31,14 @@ description: |
3131 [octree](https://octree.ch/) and made by
3232 [Secu Labs](https://seculabs.ch/) against Decidim financed
3333 by the city of Lausanne (Switzerland).
34+ cvss_v3 : 8.7
35+ cvss_v4 : 9.3
3436patched_versions :
3537 - " ~> 0.30.5"
3638 - " >= 0.31.1"
3739related :
3840 url :
41+ - https://nvd.nist.gov/vuln/detail/CVE-2026-23891
3942 - https://github.com/decidim/decidim/releases/tag/v0.31.1
4043 - https://github.com/decidim/decidim/releases/tag/v0.30.5
4144 - https://github.com/decidim/decidim/security/advisories/GHSA-fc46-r95f-hq7g
Original file line number Diff line number Diff line change 22gem : uri
33cve : 2025-61594
44ghsa : j4pr-3wm6-xx2r
5- url : https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594
5+ url : https://github.com/advisories/GHSA-j4pr-3wm6-xx2r
66title : CVE-2025-61594 - URI Credential Leakage Bypass over CVE-2025-27221
77date : 2025-10-07
88description : |
@@ -29,14 +29,18 @@ description: |
2929
3030 Thanks to junfuchong (chongfujun) for discovering this issue.
3131 Also thanks to nobu for additional fixes of this vulnerability.
32+ cvss_v3 : 7.5
33+ cvss_v4 : 2.1
3234patched_versions :
3335 - " ~> 0.12.5"
3436 - " ~> 0.13.3"
3537 - " >= 1.0.4"
3638related :
3739 url :
40+ - https://nvd.nist.gov/vuln/detail/CVE-2025-61594
3841 - https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594
3942 - https://rubygems.org/gems/uri/versions/1.0.4
4043 - https://rubygems.org/gems/uri/versions/0.13.3
4144 - https://rubygems.org/gems/uri/versions/0.12.5
4245 - https://github.com/ruby/uri
46+ - https://github.com/advisories/GHSA-j4pr-3wm6-xx2r
You can’t perform that action at this time.
0 commit comments