Browse all 5 CVE security advisories affecting MIYAGAWA. AI-powered Chinese analysis, POCs, and references for each vulnerability.
MIYAGAWA develops web application frameworks and libraries, primarily used for building dynamic web applications with Ruby. Historically, vulnerabilities associated with MIYAGAWA's projects include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation, often stemming from improper input validation and insecure default configurations. Notable security characteristics include frequent updates addressing discovered vulnerabilities, though some critical issues remained unpatched for extended periods. MIYAGAWA's contributions to the Ruby ecosystem have been significant, but the five CVEs on record highlight ongoing challenges in secure coding practices, particularly regarding user input handling and access control mechanisms.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-40560 | Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence — StarmanCWE-444 | 7.5AI | HighAI | 2026-04-28 |
This page lists every published CVE security advisory associated with MIYAGAWA. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.