Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:sinatrarb:sinatra:2.0.0:rc2:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-45442 |
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue. Published: November 28, 2022; 4:15:10 PM -0500 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2022-29970 |
Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files. Published: May 02, 2022; 1:15:06 AM -0400 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2018-11627 |
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception. Published: May 31, 2018; 3:29:00 PM -0400 |
V3.0: 6.1 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2018-7212 |
An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters. Published: February 18, 2018; 1:29:00 AM -0500 |
V3.0: 5.3 MEDIUM V2.0: 5.0 MEDIUM |