Lucene search

K

5 matches found

CVE
CVE
added 2022/11/18 11:15 p.m.774 views

CVE-2021-33621

The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

8.8CVSS8.6AI score0.02028EPSS
CVE
CVE
added 2022/01/01 6:15 a.m.439 views

CVE-2021-41819

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

7.5CVSS7.5AI score0.00566EPSS
CVE
CVE
added 2025/03/04 12:15 a.m.239 views

CVE-2025-27219

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when p...

7.5CVSS5.6AI score0.00311EPSS
CVE
CVE
added 2025/03/04 12:15 a.m.215 views

CVE-2025-27220

In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.

7.5CVSS4.3AI score0.00181EPSS
CVE
CVE
added 2022/02/06 9:15 p.m.208 views

CVE-2021-41816

CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.

9.8CVSS9.4AI score0.01587EPSS