Known vulnerabilities in openEuler rubygem-actionpack-doc

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › openEuler › rubygem-actionpack-doc

Known vulnerabilities in openEuler rubygem-actionpack-doc

Vendor: openEuler
Website: https://www.openeuler.org/
Total Security Bulletins: 11
6.1.4.1-7 5.2.4.4-6 6.1.4.1-6 5.2.4.4-5 7.0.7-3 6.1.4.1-5 5.2.4.4-4 5.2.4.4-3 5.2.4.4-2

Security bulletins (11)

Secuity bulletin Severity Status Published
SB2024112249: openEuler 22.03 LTS SP1 update for rubygem-actionpack Low
Patched
22.11.2024
SB2024070551: openEuler 22.03 LTS SP4 update for rubygem-actionpack Medium
Patched
05.07.2024
SB2024062870: openEuler 22.03 LTS SP3 update for rubygem-actionpack Medium
Patched
28.06.2024
SB2024062869: openEuler 22.03 LTS SP1 update for rubygem-actionpack Medium
Patched
28.06.2024
SB2024062868: openEuler 20.03 LTS SP4 update for rubygem-actionpack Medium
Patched
28.06.2024
SB2024061865: openEuler 24.03 LTS update for rubygem-actionpack Low
Patched
18.06.2024
SB2024061502: openEuler 22.03 LTS SP3 update for rubygem-actionpack Low
Patched
15.06.2024
SB2024061501: openEuler 22.03 LTS SP1 update for rubygem-actionpack Low
Patched
15.06.2024
SB20240312216: openEuler update for rubygem-actionpack Medium
Patched
12.03.2024
SB2021070306: openEuler 20.03 LTS SP1 update for rubygem-actionpack Medium
Patched
03.07.2021
SB2021062602: openEuler 20.03 LTS SP1 update for rubygem-actionpack Medium
Patched
26.06.2021


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or