Sinatrarb Sinatra 2.0.2

CPE Details

Sinatrarb Sinatra 2.0.2
2.0.2
2019-08-07
13h45 +00:00
2019-08-07
13h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:sinatrarb:sinatra:2.0.2:*:*:*:*:*:*:*

Informations

Vendor

sinatrarb

Product

sinatra

Version

2.0.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-61921 2025-10-10 19h28 +00:00 Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.
2.7
Low
CVE-2022-45442 2022-11-28 20h15 +00:00 Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
8.8
High
CVE-2022-29970 2022-05-02 03h15 +00:00 Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
7.5
High