-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| publify_core | rubygems | < 9.2.10 | 9.2.10 |
The commit diff shows the vulnerability was addressed by adding a length validation to the 'name' field in the User model. Prior to 9.2.10, this validation was absent, making the application susceptible to integer overflow via unchecked user input. The CWE-190 classification and advisory descriptions explicitly link the unlimited name field to the integer overflow risk. The direct correlation between the patch and the User model's validation logic provides high confidence in this assessment.
KEV Misses 88% of Exploited CVEs- Get the report