VYPR

RubyGems package

cgi

pkg:gem/cgi

Vulnerabilities (5)

  • CVE-2025-27220Mar 3, 2025
    affected < 0.3.5.1fixed 0.3.5.1

    In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.

  • CVE-2025-27219Mar 3, 2025
    affected < 0.3.5.1fixed 0.3.5.1

    In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource

  • CVE-2021-33621Nov 18, 2022
    affected >= 0.3.0, < 0.3.5fixed 0.3.5

    The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.

  • CVE-2021-41816Feb 6, 2022
    affected >= 0.3.0, < 0.3.1fixed 0.3.1

    CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.

  • CVE-2021-41819Jan 1, 2022
    affected >= 0.3.0, < 0.3.1fixed 0.3.1

    CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.