Sinatrarb Sinatra 1.4.2

CPE Details

Sinatrarb Sinatra 1.4.2
1.4.2
2018-04-12
11h33 +00:00
2018-04-12
11h33 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:sinatrarb:sinatra:1.4.2:*:*:*:*:*:*:*

Informations

Vendor

sinatrarb

Product

sinatra

Version

1.4.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-61921 2025-10-10 19h28 +00:00 Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.
2.7
Bas
CVE-2022-29970 2022-05-02 03h15 +00:00 Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
7.5
Haute
CVE-2018-11627 2018-05-31 17h00 +00:00 Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
6.1
Moyen