38 lines
1.3 KiB
Plaintext
38 lines
1.3 KiB
Plaintext
Name: actionmailer
|
|
Version: 7.1.3.4
|
|
CVE: CVE-2024-47889
|
|
GHSA: GHSA-h47h-mwp9-c6q6
|
|
Criticality: Unknown
|
|
URL: https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6
|
|
Title: Possible ReDoS vulnerability in block_format in Action Mailer
|
|
Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1'
|
|
|
|
Name: actionpack
|
|
Version: 7.1.3.4
|
|
CVE: CVE-2024-41128
|
|
GHSA: GHSA-x76w-6vjr-8xgj
|
|
Criticality: Unknown
|
|
URL: https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj
|
|
Title: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
|
|
Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1'
|
|
|
|
Name: actionpack
|
|
Version: 7.1.3.4
|
|
CVE: CVE-2024-47887
|
|
GHSA: GHSA-vfg9-r3fq-jvx4
|
|
Criticality: Unknown
|
|
URL: https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4
|
|
Title: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
|
|
Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1'
|
|
|
|
Name: actiontext
|
|
Version: 7.1.3.4
|
|
CVE: CVE-2024-47888
|
|
GHSA: GHSA-wwhv-wxv9-rpgw
|
|
Criticality: Unknown
|
|
URL: https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw
|
|
Title: Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text
|
|
Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1'
|
|
|
|
Vulnerabilities found!
|