CVE-2022-23634 Vulnerability Analysis & Exploit Details

CVE-2022-23634
Vulnerability Scoring

8.0
/10
Very High Risk

Highly exploitable, CVE-2022-23634 poses a critical security risk that could lead to severe breaches.

Attack Complexity Details

  • Attack Complexity: High
    Exploits require significant effort and special conditions.
  • Attack Vector: Network
    Vulnerability is exploitable over a network without physical access.
  • Privileges Required: None
    No privileges are required for exploitation.
  • Scope: Changed
    Successful exploitation can impact components beyond the vulnerable component.
  • User Interaction: Required
    User interaction is necessary for successful exploitation.

CVE-2022-23634 Details

Status: Modified

Last updated: 🕡 21 Nov 2024, 06:48 UTC
Originally published on: 🕙 11 Feb 2022, 22:15 UTC

Time between publication and last update: 1013 days

CVSS Release: version 3

CVSS3 Source

security-advisories@github.com

CVSS3 Type

Secondary

CVSS3 Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

CVE-2022-23634 Vulnerability Summary

CVE-2022-23634: Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.

Assessing the Risk of CVE-2022-23634

Access Complexity Graph

The exploitability of CVE-2022-23634 depends on two key factors: attack complexity (the level of effort required to execute an exploit) and privileges required (the access level an attacker needs).

Exploitability Analysis for CVE-2022-23634

CVE-2022-23634 presents a challenge to exploit due to its high attack complexity, but the absence of privilege requirements still makes it a viable target for skilled attackers. A thorough security review is advised.

Understanding AC and PR

A lower complexity and fewer privilege requirements make exploitation easier. Security teams should evaluate these aspects to determine the urgency of mitigation strategies, such as patch management and access control policies.

Attack Complexity (AC) measures the difficulty in executing an exploit. A high AC means that specific conditions must be met, making an attack more challenging, while a low AC means the vulnerability can be exploited with minimal effort.

Privileges Required (PR) determine the level of system access necessary for an attack. Vulnerabilities requiring no privileges are more accessible to attackers, whereas high privilege requirements limit exploitation to authorized users with elevated access.

CVSS Score Breakdown Chart

Above is the CVSS Sub-score Breakdown for CVE-2022-23634, illustrating how Base, Impact, and Exploitability factors combine to form the overall severity rating. A higher sub-score typically indicates a more severe or easier-to-exploit vulnerability.

CIA Impact Analysis

Below is the Impact Analysis for CVE-2022-23634, showing how Confidentiality, Integrity, and Availability might be affected if the vulnerability is exploited. Higher values usually signal greater potential damage.

  • Confidentiality: High
    Exploiting CVE-2022-23634 can result in unauthorized access to sensitive data, severely compromising data privacy.
  • Integrity: High
    CVE-2022-23634 could allow unauthorized modifications to data, potentially affecting system reliability and trust.
  • Availability: None
    CVE-2022-23634 does not impact system availability.

Exploit Prediction Scoring System (EPSS)

The EPSS score estimates the probability that this vulnerability will be exploited in the near future.

EPSS Score: 0.189% (probability of exploit)

EPSS Percentile: 57.38% (lower percentile = lower relative risk)
This vulnerability is less risky than approximately 42.62% of others.

CVE-2022-23634 References

External References

CWE Common Weakness Enumeration

CWE-404

CAPEC Common Attack Pattern Enumeration and Classification

  • Flooding CAPEC-125 An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adversary can make in a given period of time. The greater this number, the more likely an attack is to succeed against a given target.
  • Excessive Allocation CAPEC-130 An adversary causes the target to allocate excessive resources to servicing the attackers' request, thereby reducing the resources available for legitimate services and degrading or denying services. Usually, this attack focuses on memory allocation, but any finite resource on the target could be the attacked, including bandwidth, processing cycles, or other resources. This attack does not attempt to force this allocation through a large number of requests (that would be Resource Depletion through Flooding) but instead uses one or a small number of requests that are carefully formatted to force the target to allocate excessive resources to service this request(s). Often this attack takes advantage of a bug in the target to cause the target to allocate resources vastly beyond what would be needed for a normal request.
  • Resource Leak Exposure CAPEC-131 An adversary utilizes a resource leak on the target to deplete the quantity of the resource available to service legitimate requests.
  • TCP Fragmentation CAPEC-494 An adversary may execute a TCP Fragmentation attack against a target with the intention of avoiding filtering rules of network controls, by attempting to fragment the TCP packet such that the headers flag field is pushed into the second fragment which typically is not filtered.
  • UDP Fragmentation CAPEC-495 An attacker may execute a UDP Fragmentation attack against a target server in an attempt to consume resources such as bandwidth and CPU. IP fragmentation occurs when an IP datagram is larger than the MTU of the route the datagram has to traverse. Typically the attacker will use large UDP packets over 1500 bytes of data which forces fragmentation as ethernet MTU is 1500 bytes. This attack is a variation on a typical UDP flood but it enables more network bandwidth to be consumed with fewer packets. Additionally it has the potential to consume server CPU resources and fill memory buffers associated with the processing and reassembling of fragmented packets.
  • ICMP Fragmentation CAPEC-496 An attacker may execute a ICMP Fragmentation attack against a target with the intention of consuming resources or causing a crash. The attacker crafts a large number of identical fragmented IP packets containing a portion of a fragmented ICMP message. The attacker these sends these messages to a target host which causes the host to become non-responsive. Another vector may be sending a fragmented ICMP message to a target host with incorrect sizes in the header which causes the host to hang.
  • BlueSmacking CAPEC-666 An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.

Vulnerable Configurations

  • cpe:2.3:a:puma:puma:-:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:-:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.0.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.0.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.1.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.1.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.1.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.1.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.2.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.2.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.2.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.2.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.2.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.2.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.3.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.3.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.3.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.3.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.4.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.4.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.5.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.5.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:1.6.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:1.6.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:-:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:-:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:beta2:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:beta2:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:beta3:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:beta3:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:beta4:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:beta4:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:beta5:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:beta5:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:beta6:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:beta6:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.0:beta7:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.0:beta7:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.0.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.0.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.1.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.1.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.1.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.1.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.2.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.2.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.2.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.2.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.2.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.2.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.3.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.3.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.3.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.3.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.3.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.3.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.4.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.4.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.4.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.4.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.5.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.5.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.5.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.5.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.6.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.6.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.7.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.7.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.7.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.7.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.8.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.8.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.8.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.8.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.8.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.8.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.9.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.9.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.9.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.9.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.9.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.9.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.10.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.10.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.10.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.10.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.10.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.10.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.11.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.11.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.11.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.11.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.11.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.11.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.12.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.12.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.12.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.12.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.12.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.12.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.12.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.12.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.13.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.13.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.13.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.13.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.13.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.13.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.13.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.13.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.13.4:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.13.4:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.14.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.14.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.15.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.15.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.15.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.15.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.15.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.15.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.15.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.15.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:2.16.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:2.16.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.0.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.0.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.0.0:rc1:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.0.0:rc1:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.0.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.0.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.0.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.0.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.1.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.1.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.1.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.1.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.2.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.2.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.3.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.3.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.4.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.4.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.5.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.5.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.5.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.5.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.5.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.5.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.6.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.6.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.6.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.6.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.6.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.6.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.7.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.7.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.7.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.7.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.8.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.8.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.8.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.8.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.8.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.8.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.9.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.9.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.9.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.9.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.10.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.10.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.11.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.11.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.11.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.11.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.11.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.11.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.11.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.11.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.11.4:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.11.4:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.4:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.4:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.5:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.5:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:3.12.6:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:3.12.6:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.0.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.0.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.0.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.0.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.1.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.1.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.1.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.1.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.2.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.2.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.2.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.2.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.4:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.4:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.5:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.5:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.6:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.6:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.7:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.7:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.8:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.8:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.9:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.9:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:4.3.10:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:4.3.10:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.0:-:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.0:-:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.0:beta1:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.0:beta1:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.0:beta2:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.0:beta2:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.3:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.3:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.0.4:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.0.4:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.1.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.1.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.1.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.1.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.2.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.2.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.2.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.2.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.2.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.2.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.3.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.3.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.3.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.3.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.3.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.3.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.4.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.4.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.5.0:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.5.0:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.5.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.5.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.5.2:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.5.2:*:*:*:*:ruby:*:*
  • cpe:2.3:a:puma:puma:5.6.1:*:*:*:*:ruby:*:*
    cpe:2.3:a:puma:puma:5.6.1:*:*:*:*:ruby:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.1:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.1:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.2:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.2:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.4:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.4:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.5:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.5:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.5:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.5:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.5:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.5:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.6:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.6:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.6:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.6:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.2:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.3:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.3:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.3:rc3:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.3:rc3:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.4:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.4:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.5:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.5:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.5:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.5:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.7:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.7:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.1.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.1.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.1:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.1:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.2:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.2:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.3:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.3:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.1:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.1:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.2:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.2:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.0.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.0.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:6.1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:6.1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:7.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:7.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:7.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:7.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:7.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:7.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:7.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:7.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

Protect Your Infrastructure against CVE-2022-23634: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Other 5 Recently Published CVEs Vulnerabilities

  • CVE-2025-43903 – NSSCryptoSignBackend.cc in Poppler before 25.04.0 does not verify the adbe.pkcs7.sha1 signatures on documents, resulting in potential signature forgeries.
  • CVE-2025-3796 – A vulnerability classified as critical has been found in PHPGurukul Men Salon Management System 1.0. This affects an unknown part of the file /admi...
  • CVE-2025-32953 – z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `...
  • CVE-2025-29058 – An issue in Qimou CMS v.3.34.0 allows a remote attacker to execute arbitrary code via the upgrade.php component.
  • CVE-2024-53591 – An issue in the login page of Seclore v3.27.5.0 allows attackers to bypass authentication via a brute force attack.