Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

MIYAGAWA — Vulnerabilities & Security Advisories 5

Browse all 5 CVE security advisories affecting MIYAGAWA. AI-powered Chinese analysis, POCs, and references for each vulnerability.

MIYAGAWA develops web application frameworks and libraries, primarily used for building dynamic web applications with Ruby. Historically, vulnerabilities associated with MIYAGAWA's projects include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation, often stemming from improper input validation and insecure default configurations. Notable security characteristics include frequent updates addressing discovered vulnerabilities, though some critical issues remained unpatched for extended periods. MIYAGAWA's contributions to the Ruby ecosystem have been significant, but the five CVEs on record highlight ongoing challenges in secure coding practices, particularly regarding user input handling and access control mechanisms.

This page lists every published CVE security advisory associated with MIYAGAWA. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.