You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: advisories/github-reviewed/2025/12/GHSA-j4pr-3wm6-xx2r/GHSA-j4pr-3wm6-xx2r.json
+27-2Lines changed: 27 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,18 @@
1
1
{
2
2
"schema_version": "1.4.0",
3
3
"id": "GHSA-j4pr-3wm6-xx2r",
4
-
"modified": "2025-12-30T21:07:15Z",
4
+
"modified": "2026-04-24T13:42:05Z",
5
5
"published": "2025-12-30T21:07:14Z",
6
6
"aliases": [
7
7
"CVE-2025-61594"
8
8
],
9
9
"summary": "URI Credential Leakage Bypass over CVE-2025-27221",
10
10
"details": "### Impact\n\nIn affected URI version, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials.\n\nWhen using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure.\n\nThe vulnerability affects the `uri` gem bundled with the following Ruby series:\n\n* 0.12.4 and earlier (bundled in Ruby 3.2 series)\n* 0.13.2 and earlier (bundled in Ruby 3.3 series)\n* 1.0.3 and earlier (bundled in Ruby 3.4 series)\n\n### Patches\n\nUpgrade to 0.12.5, 0.13.3 or 1.0.4\n\n### References\n\n* https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/\n* https://hackerone.com/reports/2957667",
Copy file name to clipboardExpand all lines: advisories/github-reviewed/2026/04/GHSA-jg4p-7fhp-p32p/GHSA-jg4p-7fhp-p32p.json
+6-2Lines changed: 6 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,18 @@
1
1
{
2
2
"schema_version": "1.4.0",
3
3
"id": "GHSA-jg4p-7fhp-p32p",
4
-
"modified": "2026-04-06T23:43:40Z",
4
+
"modified": "2026-04-24T13:43:15Z",
5
5
"published": "2026-04-04T04:23:03Z",
6
6
"aliases": [
7
7
"CVE-2026-35213"
8
8
],
9
9
"summary": "@hapi/content: Regular Expression Denial of Service (ReDoS) in HTTP header parsing",
10
-
"details": "All versions of `@hapi/content` through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse `Content-Type` and `Content-Disposition` headers contain patterns susceptible to catastrophic backtracking.\n\n### Impact\n\nDenial of Service. An unauthenticated remote attacker can cause a Node.js process to become unresponsive by sending a single HTTP request with a maliciously crafted header value.\n\n### Patches\n\nFixed by tightening all three regular expressions to eliminate backtracking.\n\n### Workarounds\n\nThere are no known workarounds. Upgrade to the patched version.",
10
+
"details": "All versions of `@hapi/content` through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse `Content-Type` and `Content-Disposition` headers contain patterns susceptible to catastrophic backtracking. This has been fixed in v6.0.1.\n\n### Impact\n\nDenial of Service. An unauthenticated remote attacker can cause a Node.js process to become unresponsive by sending a single HTTP request with a maliciously crafted header value.\n\n### Patches\n\nFixed by tightening all three regular expressions to eliminate backtracking.\n\n### Workarounds\n\nThere are no known workarounds. Upgrade to the patched version.",
0 commit comments