Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nullclasses
4 values
aliases
stringlengths
2
20
summary
stringlengths
24
115
details
stringlengths
47
1.85k
severity
stringclasses
24 values
affected
stringlengths
90
2.44k
references
stringlengths
161
4.51k
database_specific
stringlengths
131
175
1.4.0
GHSA-jjv7-qpx3-h62q
2021-09-14T19:46:47Z
2017-10-24T18:33:36Z
null
['CVE-2014-7191']
Denial-of-Service Memory Exhaustion in qs
Versions prior to 1.0 of `qs` are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing. ## Recommendation Update to version 1.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/node-querystring/issues/104'}, {'type': 'WEB', 'url': 'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:41Z', 'nvd_published_at': None}
1.4.0
GHSA-vxvp-4xwc-jpp6
2023-01-23T18:04:55Z
2017-10-24T18:33:36Z
null
['CVE-2015-3226']
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228033946/http://www.securityfocus.com/bid/75231'}, {'type': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:02Z', 'nvd_published_at': None}
1.4.0
GHSA-9fh3-vh3h-q4g3
2023-05-12T17:06:32Z
2017-10-24T18:33:38Z
null
['CVE-2011-2932']
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.r`b in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping ...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731435'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rai...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:22Z', 'nvd_published_at': None}
1.4.0
GHSA-xqg8-cv3h-xppv
2021-09-22T15:12:11Z
2017-10-24T18:33:36Z
null
['CVE-2015-1369']
SQL Injection in sequelize
Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter. ## Proof of Concept ```javascript Test.findAndCountAll({ where: { id :1 }, order : [['id', 'UNTRUSTED USER INPUT']] }) ``` ## Recommendation Update to version 2.0.0-rc8...
[]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/2906'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/2919'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv'}, {'ty...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:08Z', 'nvd_published_at': None}
1.4.0
GHSA-gppp-5xc5-wfpx
2023-08-25T23:11:25Z
2017-10-24T18:33:37Z
null
['CVE-2013-0155']
Active Record allows bypassing of database-query restrictions
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger mi...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0155.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gpl...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:49Z', 'nvd_published_at': None}
1.4.0
GHSA-8qrh-h9m2-5fvf
2023-06-19T21:08:41Z
2017-10-24T18:33:38Z
null
['CVE-2009-3009']
Cross site scripting that affects rails
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:29Z', 'nvd_published_at': None}
1.4.0
GHSA-mgx3-27hr-mfgp
2023-03-14T20:47:11Z
2017-10-24T18:33:37Z
null
['CVE-2013-1801']
HTTParty does not restrict casts of string values
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a simila...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'httparty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917229'}, {'type': 'PACKAGE', 'url': 'https://github.com/j...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:12Z', 'nvd_published_at': None}
1.4.0
GHSA-r9c2-cr39-c8g6
2023-01-24T14:56:23Z
2017-10-24T18:33:36Z
null
['CVE-2015-7579']
rails-html-sanitizer Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the `Rails::Html::FullSanitizer` class.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://groups.goo...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:13Z', 'nvd_published_at': None}
1.4.0
GHSA-h77x-m5q8-c29h
2023-08-25T23:23:23Z
2017-10-24T18:33:37Z
null
['CVE-2012-6109']
Rack vulnerable to REDoS
`lib/rack/multipart.rb` in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cv...
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:20Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-h5g2-38x9-4gv3
2023-09-05T21:02:41Z
2017-10-24T18:33:35Z
null
['CVE-2016-10173']
archive-tar-minitar and minitar vulnerable to Path Traversal
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a `..` (dot dot) in a TAR archive entry.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ecosystem_specific': {'affected_functions': ['']}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/halo...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:02Z', 'nvd_published_at': None}
1.4.0
GHSA-3fx5-fwvr-xrjg
2021-09-22T20:19:52Z
2017-10-24T18:33:36Z
null
['CVE-2015-8315']
Regular Expression Denial of Service in ms
Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Proof of Concept ```javascript var ms = require('ms'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr;...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/millisecond/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&amp;utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:05Z', 'nvd_published_at': None}
1.4.0
GHSA-gfjr-3jmm-4g9v
2021-09-10T20:53:22Z
2017-10-24T18:33:36Z
null
['CVE-2015-8860']
Symlink Arbitrary File Overwrite in tar
Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory. ## Recommendation Update to version 2.0.0 or later
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/releases/tag/v2.7.5'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:06Z', 'nvd_published_at': None}
1.4.0
GHSA-6mq2-37j5-w6r6
2023-08-01T21:37:33Z
2017-10-24T18:33:38Z
null
['CVE-2009-4492']
WEBrick Improper Input Validation vulnerability
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/webrick'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100113155532/http://www.vupen.com/english...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:44Z', 'nvd_published_at': None}
1.4.0
GHSA-vxf6-w9mp-95hm
2023-05-12T17:24:42Z
2017-10-24T18:33:38Z
null
['CVE-2012-3408']
Puppet supports use of IP addresses in certnames without warning of potential risks
`lib/puppet/network/authstore.rb` in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839166'}, {'type': 'PACKAGE', 'url': 'https://github.com/pup...
{'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:51Z', 'nvd_published_at': '2012-08-06T16:55:00Z'}
1.4.0
GHSA-59c7-4xj2-hgvw
2023-01-23T20:38:10Z
2017-10-24T18:33:36Z
null
['CVE-2015-7578']
rails-html-sanitizer Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.go...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:19Z', 'nvd_published_at': None}
1.4.0
GHSA-v3rr-cph9-2g2q
2023-01-23T18:02:54Z
2017-10-24T18:33:36Z
null
['CVE-2014-2538']
rack-ssl Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `lib/rack/ssl.rb` in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-ssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538'}, {'type': 'WEB', 'url': 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b'}, {'type': 'PACKAGE', 'url': 'https://github.com/josh/rack-ssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:31Z', 'nvd_published_at': None}
1.4.0
GHSA-8fqx-7pv4-3jwm
2023-05-26T16:54:58Z
2017-10-24T18:33:38Z
null
['CVE-2008-7248']
Improper Input Validation in actionpack
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/sh...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:28Z', 'nvd_published_at': '2009-12-16T01:30:00Z'}
1.4.0
GHSA-fcqf-h4h4-695m
2023-07-19T18:42:54Z
2017-10-24T18:33:38Z
null
['CVE-2011-3186']
actionpack CRLF injection vulnerability
CRLF injection vulnerability in `actionpack/lib/action_controller/response.rb` in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=732156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rai...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:21Z', 'nvd_published_at': None}
1.4.0
GHSA-cfjh-p3g4-3q2f
2021-09-09T17:02:02Z
2017-10-24T18:33:36Z
null
['CVE-2015-1370']
VBScript Content Injection in marked
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. ## Proof of Concept ( IE10 Compatibility Mode Only ) `[xss link](vbscript:alert(1&#41;)` will get a link `<a href="vbscript:alert(1)">xss link</a>` ## Recommendation Update to version 0....
[]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:22Z', 'nvd_published_at': None}
1.4.0
GHSA-jxx8-v83v-rhw3
2023-08-29T09:24:34Z
2017-10-24T18:33:37Z
null
['CVE-2013-1656']
Spree Improper Input Validation vulnerability
Spree Commerce 1.0.x before 2.0.0.rc1 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) `payment_method` parameter to `core/app/controllers/spree/admin/payment_methods_controller.rb`; and the (2) `promotion_action parameter` to `promotion_actions...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0.rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/commit/70092eb55b8be8fe5d21a7658b62da658612fba7'}, {'type': 'WEB', 'url': 'https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656'}, {...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:31Z', 'nvd_published_at': None}
1.4.0
GHSA-w6rc-q387-vpgq
2023-06-09T20:17:24Z
2017-10-24T18:33:37Z
null
['CVE-2013-4136']
insecure temporary directory usage in passenger
ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'}, {'type': 'WEB', 'url': 'https://code.google.com/p/phusion-passenger/issues/detail?id=910'}, {'type': 'ADVISORY', 'url': 'https:/...
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:27Z', 'nvd_published_at': None}
1.4.0
GHSA-j24p-r6wx-r79w
2021-09-14T18:09:44Z
2017-10-24T18:33:38Z
null
['CVE-2009-3287']
High severity vulnerability that affects thin
lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'thin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3287'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j24p-r6wx-r79w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thin/CVE-2009-3287.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/m...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:36Z', 'nvd_published_at': None}
1.4.0
GHSA-xrr4-p6fq-hjg7
2023-07-05T20:50:18Z
2017-10-24T18:33:35Z
null
['CVE-2016-0752']
Directory traversal vulnerability in Action View in Ruby on Rails
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a `..` (dot dot) in a ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-p6fq-hjg7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:24Z', 'nvd_published_at': None}
1.4.0
GHSA-mpxf-gcw2-pw5q
2023-07-31T18:14:44Z
2017-10-24T18:33:37Z
null
['CVE-2013-6414']
actionpack Improper Input Validation vulnerability
`actionpack/lib/action_view/lookup_context.rb` in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6414'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6414.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!top...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:47Z', 'nvd_published_at': None}
1.4.0
GHSA-w37c-q653-qg95
2023-07-26T18:41:29Z
2017-10-24T18:33:36Z
null
['CVE-2013-6416']
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the simple_format helper in `actionpack/lib/action_view/helpers/text_helper.rb` in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6416'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4b4f5847f64f81c961625e647711ef9f6ad1a454'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:19Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}
1.4.0
GHSA-v2r9-c84j-v7xm
2023-07-05T20:39:56Z
2017-10-24T18:33:37Z
null
['CVE-2013-0256']
RDoc contains XSS vulnerability
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256'}, {'type': 'WEB', 'url': 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=907820'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:28Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-87vv-r9j6-g5qv
2022-06-07T14:31:25Z
2017-10-24T18:33:35Z
null
['CVE-2016-4055']
Regular Expression Denial of Service in moment
Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`. ## Proof of concept ``` var moment = require('moment'); var genstr = function (len, chr) { var result = ""; f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d7...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:44Z', 'nvd_published_at': '2017-01-23T21:59:00Z'}
1.4.0
GHSA-78j3-7wpm-qhvp
2023-07-05T19:12:35Z
2017-10-24T18:33:37Z
null
['CVE-2013-1947']
Shell Metacharacter Injection in kelredd-pruview
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to document.rb, video.rb, or video_image.rb.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'kelredd-pruview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-78j3-7wpm-qhvp'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kelredd-pruview/CVE-2013-1947.yml'}, {'type': 'WEB', 'url': 'http://vapid...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:10Z', 'nvd_published_at': None}
1.4.0
GHSA-5vx5-9q73-wgp4
2023-09-05T21:30:18Z
2017-10-24T18:33:35Z
null
['CVE-2017-7540']
Safemode Gem Has Incomplete List of Disallowed Inputs
rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/pull/23'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenf...
{'cwe_ids': ['CWE-184'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:24Z', 'nvd_published_at': '2017-07-21T22:29:00Z'}
1.4.0
GHSA-gr44-7grc-37vq
2023-01-23T17:23:13Z
2017-10-24T18:33:37Z
null
['CVE-2013-0276']
ActiveRecord vulnerable to modification of protected model attributes
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the `attr_protected` protection mechanism and modify protected model attributes via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0276.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gpl...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:57Z', 'nvd_published_at': None}
1.4.0
GHSA-9qj7-jvg4-qr2x
2023-07-05T18:50:18Z
2017-10-24T18:33:37Z
null
['CVE-2013-2119']
Phusion Passenger Denial of Service
Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in `/tmp/` before it is used by the gem.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=892813'}, {'type'...
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:24Z', 'nvd_published_at': '2014-01-03T18:54:00Z'}
1.4.0
GHSA-p65m-qr5x-rrqq
2023-01-26T21:22:44Z
2017-10-24T18:33:36Z
null
['CVE-2013-7086']
Webbynode Code Injection vulnerability
The message function in `lib/webbynode/notify.rb` in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'webbynode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086'}, {'type': 'WEB', 'url': 'https://github.com/webbynode/webbynode/pull/85'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:09Z', 'nvd_published_at': None}
1.4.0
GHSA-jmgf-p46x-982h
2023-05-11T13:47:53Z
2017-10-24T18:33:38Z
null
['CVE-2008-5189']
rails is vulnerable to CRLF injection
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmgf-p46x-982h'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2008-5189.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:46Z', 'nvd_published_at': None}
1.4.0
GHSA-3pxh-h8hw-mj8w
2023-08-28T12:50:30Z
2017-10-24T18:33:37Z
null
['CVE-2013-0183']
Rack rubygems receiving excessively long lines triggers out-of-memory error
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-119', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:49Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-jmgw-6vjg-jjwg
2023-02-15T22:22:59Z
2017-10-24T18:33:37Z
null
['CVE-2013-0156']
actionpack Improper Input Validation vulnerability
`active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (m...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://gro...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:48Z', 'nvd_published_at': '2013-01-13T22:55:00Z'}
1.4.0
GHSA-fh39-v733-mxfr
2023-03-14T22:18:13Z
2017-10-24T18:33:38Z
null
['CVE-2012-2661']
Active Record vulnerable to SQL Injection via nested query parameters
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverag...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'pack...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2661'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': '...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:40Z', 'nvd_published_at': None}
1.4.0
GHSA-cj92-c4fj-w9c5
2023-09-05T21:10:15Z
2017-10-24T18:33:38Z
null
['CVE-2012-2139']
Mail Gem Path Traversal vulnerability
Directory traversal vulnerability in `lib/mail/network/delivery_methods/file_delivery.rb` in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a `..` (dot dot) in the to parameter.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:54Z', 'nvd_published_at': None}
1.4.0
GHSA-q4qq-fm7q-cwp5
2021-09-16T19:30:36Z
2017-10-24T18:33:36Z
null
['CVE-2013-7454']
Multiple XSS Filter Bypasses in validator
Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter. ## Proof of Concept Various inputs that could bypass the filter were discovered: Improper parsing of nested tags: ``` <s <onmouseover="alert(1)"> <;s onmouseo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:57Z', 'nvd_published_at': None}
1.4.0
GHSA-76wq-xw4h-f8wj
2023-05-12T17:04:06Z
2017-10-24T18:33:38Z
null
['CVE-2012-2695']
activerecord vulnerable to SQL Injection
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage impr...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2695.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonr...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:41Z', 'nvd_published_at': None}
1.4.0
GHSA-jg4m-q6w8-vrjp
2023-01-26T21:04:14Z
2017-10-24T18:33:37Z
null
['CVE-2013-4203']
rgpg Code Injection vulnerability
The `self.run_gpg` function in `lib/rgpg/gpg_helper.rb` in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rgpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'}, {'type': 'WEB', 'url': 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcook/rgpg'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/m...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:21Z', 'nvd_published_at': None}
1.4.0
GHSA-574q-fxfj-wv6h
2023-05-12T17:26:05Z
2017-10-24T18:33:37Z
null
['CVE-2013-1655']
Puppet Improper Input Validation vulnerability
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-1655.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:17Z', 'nvd_published_at': None}
1.4.0
GHSA-5726-g6r9-5f22
2022-02-25T19:54:10Z
2017-10-24T18:33:36Z
null
['CVE-2014-7192']
Potential for Script Injection in syntax-error
Versions of `syntax-error` prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified. ## Recommendation Update to version 1.1.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'syntax-error'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7192'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96728'}, {'type': 'ADVISORY', 'url': 'http...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:12Z', 'nvd_published_at': None}
1.4.0
GHSA-w754-gq8r-pf5f
2023-08-29T14:01:28Z
2017-10-24T18:33:37Z
null
['CVE-2013-2616']
MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
`lib/mini_magick.rb` in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mini_magick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2616'}, {'type': 'PACKAGE', 'url': 'https://github.com/minimagick/minimagick'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mini_magick/CVE-2013-2616.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/we...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:55Z', 'nvd_published_at': None}
1.4.0
GHSA-ww79-8xwv-932x
2023-08-28T16:11:35Z
2017-10-24T18:33:36Z
null
['CVE-2014-0036']
rbovirt uses the rest-client gem with SSL verification disabled
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rbovirt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0036'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058595'}, {'type': 'PACKAGE', 'url': 'https://github.com/abenari/rbovirt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rbovirt/CV...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:20Z', 'nvd_published_at': None}
1.4.0
GHSA-8r6h-7x9g-xmw9
2023-01-23T20:49:57Z
2017-10-24T18:33:36Z
null
['CVE-2013-6459']
will_paginate Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'will_paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/mislav/will_paginate'}, {'type': 'WEB', 'url': 'https://github.com/mislav/will_paginate/releases/tag/v3.0.5'}, {'type'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:31Z', 'nvd_published_at': None}
1.4.0
GHSA-rxq3-gm4p-5fj4
2023-05-11T13:58:44Z
2017-10-24T18:33:38Z
null
['CVE-2009-2422']
rails vulnerable to improper authentication
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:22Z', 'nvd_published_at': None}
1.4.0
GHSA-qrgf-jqqm-x7xv
2023-01-24T14:54:19Z
2017-10-24T18:33:37Z
null
['CVE-2013-5671']
Code injection in dragonfly gem
`lib/dragonfly/imagemagickutils.rb` in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fog-dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/520'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/486'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:41Z', 'nvd_published_at': None}
1.4.0
GHSA-jxhw-mg8m-2pj8
2023-01-23T21:20:12Z
2017-10-24T18:33:37Z
null
['CVE-2013-0233']
Devise does not properly perform type conversion when performing database queries
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via un...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233'}, {'type': 'WEB', 'url': 'https://github.com/Snorby/snorby/issues/261'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140726005251/http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:21Z', 'nvd_published_at': None}
1.4.0
GHSA-xf96-32q2-9rw2
2023-05-26T16:40:08Z
2017-10-24T18:33:38Z
null
['CVE-2008-4094']
Rails ActiveRecord gem vulnerable to SQL injection
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) `:limit` and (2) `:offset` parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ef0ea782b1f5cf7b08e74ea3002a16c708f66645'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109'}, {'type': 'PACKAGE', 'url': 'https://github.com/r...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:04Z', 'nvd_published_at': None}
1.4.0
GHSA-fqrr-rrwg-69pv
2023-07-05T18:46:48Z
2017-10-24T18:33:36Z
null
['CVE-2014-1233']
Local API Login Credentials Disclosure in paratrooper-pingdom
The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process. ### Vulnerable Code: From: `paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb` ```ruby def setup(options = {}) %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d ...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-pingdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1233'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fqrr-rrwg-69pv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-pingdom/CVE-2014-1233.yml'}, {'type': 'WEB', 'url': 'http://o...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:08Z', 'nvd_published_at': '2014-01-10T12:02:00Z'}
1.4.0
GHSA-543v-gj2c-r3ch
2023-06-30T21:32:03Z
2017-10-24T18:33:35Z
null
['CVE-2016-0753']
activemodel contains Improper Input Validation
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECO...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!to...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:56Z', 'nvd_published_at': None}
1.4.0
GHSA-552w-rqg8-gxxm
2021-09-01T19:26:29Z
2017-10-24T18:33:36Z
null
['CVE-2013-7453']
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7453'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-552w-rqg8-gxxm'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:02Z', 'nvd_published_at': None}
1.4.0
GHSA-c5qq-g673-5p49
2023-05-12T17:08:19Z
2017-10-24T18:33:38Z
null
['CVE-2012-1989']
Puppet allows local users to overwrite arbitrary files via a symlink attack
`telnet.rb` in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (`/tmp/out.log`).
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.1'}, {'fixed': '2.7.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/p...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:16Z', 'nvd_published_at': None}
1.4.0
GHSA-hqf9-rc9j-5fmj
2023-07-05T17:50:02Z
2017-10-24T18:33:36Z
null
['CVE-2014-0080']
Array data injection vulnerability in activerecord
SQL injection vulnerability in `activerecord/lib/active_record/connection_adapters/postgresql/cast.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving `\` (backslash) characters that are not ...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0.beta1'}, {'fixed': '4.1.0.beta2'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0080'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hqf9-rc9j-5fmj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:47Z', 'nvd_published_at': None}
1.4.0
GHSA-73qw-ww62-m54x
2023-01-25T23:05:06Z
2017-10-24T18:33:36Z
null
['CVE-2015-7541']
colorscore Command Injection vulnerability
The initialize method in the Histogram class in `lib/colorscore/histogram.rb` in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) `image_path`, (2) `colors`, or (3) `depth` variable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'WEB', 'url': 'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'}, {'type': 'PACKAGE', 'url': 'https://github.com/quadule/colorscore'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-ad...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:15Z', 'nvd_published_at': None}
1.4.0
GHSA-f7f4-5w9j-23p2
2023-01-25T23:16:58Z
2017-10-24T18:33:35Z
null
['CVE-2016-10194']
festivaltts4r allows arbitrary command execution
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'WEB', 'url': 'https://github.com/spejman/festivaltts4r/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/spejman/festivaltts4r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:56Z', 'nvd_published_at': None}
1.4.0
GHSA-vx9j-46rh-fqr8
2023-07-05T20:44:17Z
2017-10-24T18:33:35Z
null
['CVE-2016-2097']
actionview contains Path Traversal vulnerability
There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all possible scenarios. This vulnerability has been assigned the CVE identifier CVE-2016-2097. Versions Affected: 3.2.x, 4.0.x, 4.1.x Not affec...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a1d3ea617ffb0c8ae8467fa439bf63a3bfc4324'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:49Z', 'nvd_published_at': None}
1.4.0
GHSA-c9c5-9fpr-m882
2023-01-25T23:16:15Z
2017-10-24T18:33:36Z
null
['CVE-2014-9490']
sentry-raven allows remote attackers to cause a denial of service via a large exponent value in a scientific number
The `numtok` function in `lib/raven/okjson.rb` in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sentry-raven'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9490'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:45Z', 'nvd_published_at': None}
1.4.0
GHSA-v633-x5vv-hqwc
2021-09-20T15:12:25Z
2017-10-24T18:33:36Z
null
['CVE-2015-8856']
Cross-Site Scripting in serve-index
Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application. ## Recomm...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serve-index'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/commit/7381a1d1458959e57ee53ac932b06ff17904777e'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:54Z', 'nvd_published_at': None}
1.4.0
GHSA-4jm3-pfpf-h54p
2023-01-25T22:57:24Z
2017-10-24T18:33:35Z
null
['CVE-2016-10193']
espeak-ruby allows arbitrary command execution
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the `speak`, `save`, `bytes` or `bytes_wav` method in `lib/espeak/speech.rb`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/commit/5251744b13bdd9fb0c72c612226e72d330bac143'}, {'type': 'PACKAGE', 'url': 'https://github.com/dejan/e...
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:29Z', 'nvd_published_at': None}
1.4.0
GHSA-6x46-7rrv-m4h8
2023-05-12T16:04:23Z
2017-10-24T18:33:38Z
null
['CVE-2011-0995']
sqlite3-ruby uses weak permissions for unspecified files, which allows local users to gain privileges
The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sqlite3-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sqlite3-ruby/CVE-2011-0995.yml'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:29Z', 'nvd_published_at': None}
1.4.0
GHSA-9h6g-gp95-x3q5
2022-04-25T20:52:00Z
2017-10-24T18:33:36Z
null
['CVE-2015-7581']
actionpack is vulnerable to denial of service because of a wildcard controller route
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7581.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE'}, {'type': 'WEB', 'url': ...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:45Z', 'nvd_published_at': None}
1.4.0
GHSA-mx9f-w8qq-q5jf
2023-01-23T21:26:28Z
2017-10-24T18:33:36Z
null
['CVE-2015-3448']
rest-client allows local users to obtain sensitive information by reading the log
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/349'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228154247/http://www.securit...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:35Z', 'nvd_published_at': None}
1.4.0
GHSA-fjfg-q662-gm6j
2023-05-11T13:40:44Z
2017-10-24T18:33:38Z
null
['CVE-2007-5379']
Moderate severity vulnerability that affects rails
Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Ga...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5379'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjfg-q662-gm6j'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:46Z', 'nvd_published_at': None}
1.4.0
GHSA-8jxj-9r5f-w3m2
2023-05-12T17:05:34Z
2017-10-24T18:33:37Z
null
['CVE-2012-3866']
Puppet allows local users to obtain sensitive configuration information
`lib/puppet/defaults.rb` in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for `last_run_report.yaml`, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839135'}, {'type': 'PACKAGE', 'url': 'https://github.com/pup...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:49Z', 'nvd_published_at': None}
1.4.0
GHSA-7cgp-c3g7-qvrw
2023-06-30T21:25:19Z
2017-10-24T18:33:36Z
null
['CVE-2014-0082']
actionpack Improper Input Validation vulnerability
`actionpack/lib/action_view/template/text.rb` in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the `:text` option to the `render` method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0082'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0082.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202012070...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:28Z', 'nvd_published_at': None}
1.4.0
GHSA-c92m-rrrc-q5wf
2023-09-05T21:11:43Z
2017-10-24T18:33:35Z
null
['CVE-2016-3693']
safemode gem allows context-dependent attackers to obtain sensitive information via the inspect method
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:40Z', 'nvd_published_at': '2016-05-20T14:59:00Z'}
1.4.0
GHSA-rfmf-rx8w-935w
2023-07-03T21:20:17Z
2017-10-24T18:33:37Z
null
['CVE-2013-5647']
Sounder Contains Arbitrary Command Execution Vulnerability
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sounder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5647'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamzaninovich/sounder'}, {'type': 'WEB', 'url': 'https://github.com/adamzaninovich/sounder/blob/v1.0.1/lib/sounder/sound.rb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:35Z', 'nvd_published_at': None}
1.4.0
GHSA-3vfw-7rcp-3xgm
2023-05-12T15:20:04Z
2017-10-24T18:33:38Z
null
['CVE-2011-3187']
actionpack Improper Input Validation vulnerability
The `to_s` method in `actionpack/lib/action_dispatch/middleware/remote_ip.rb` in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafte...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=673010'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:30Z', 'nvd_published_at': None}
1.4.0
GHSA-6jvm-3j5h-79f6
2023-01-23T20:43:16Z
2017-10-24T18:33:36Z
null
['CVE-2015-2963']
paperclip Cross-site Scripting vulnerability
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}, {'type': 'WEB', 'url': 'https://robots.thoughtbot.com/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:37Z', 'nvd_published_at': None}
1.4.0
GHSA-qpjp-7rp2-9c3f
2021-09-16T20:03:05Z
2017-10-24T18:33:36Z
null
['CVE-2013-7451']
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:26Z', 'nvd_published_at': None}
1.4.0
GHSA-rvpq-5xqx-pfpp
2023-05-11T13:57:05Z
2017-10-24T18:33:38Z
null
['CVE-2006-4111']
Ruby on Rails vulnerable to code injection
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp'}, {'type': 'WEB', 'url': 'https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:02Z', 'nvd_published_at': None}
1.4.0
GHSA-q6cw-2553-7837
2023-08-29T13:38:38Z
2017-10-24T18:33:37Z
null
['CVE-2013-0284']
newrelic_rpm Gem Discloses Sensitive Information
Ruby agent 3.2.0 through 3.5.3.23 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'newrelic_rpm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.5.3.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.3.23'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284'}, {'type': 'PACKAGE', 'url': 'https://github.com/newrelic/newrelic-ruby-agent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/newrelic_rpm/CVE-2013-0284.yml'}, {'type': 'WEB', 'url': 'https://newrelic.c...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:15Z', 'nvd_published_at': None}
1.4.0
GHSA-2fqv-h3r5-m4vf
2021-08-30T21:12:50Z
2017-10-24T18:33:35Z
null
['CVE-2017-1000006']
Cross Site Scripting (XSS) in plotly.js
Affected versions of `plotly.js` are vulnerable to cross-site scripting if an attacker can convince a user to visit a malicious plot on a site using this package. ## Recommendation Update to 1.16.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'plotly.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000006'}, {'type': 'WEB', 'url': 'https://acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2fqv-h3r5-m4vf'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:53Z', 'nvd_published_at': None}
1.4.0
GHSA-qqxp-xp9v-vvx6
2023-09-27T21:55:57Z
2017-10-24T18:33:37Z
null
['CVE-2012-6662']
jquery-ui Tooltip widget vulnerable to XSS
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ran...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:37Z', 'nvd_published_at': None}
1.4.0
GHSA-9p3v-wf2w-v29c
2021-09-08T20:12:31Z
2017-10-24T18:33:38Z
null
['CVE-2009-4214']
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scann...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9p3v-wf2w-v29c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-4214.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:07Z', 'nvd_published_at': None}
1.4.0
GHSA-78rc-8c29-p45g
2023-07-03T18:58:43Z
2017-10-24T18:33:35Z
null
['CVE-2016-2098']
actionpack allows remote code execution via application's unrestricted use of render method
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2098.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!top...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:13Z', 'nvd_published_at': None}
1.4.0
GHSA-h6w6-xmqv-7q78
2023-05-12T17:14:49Z
2017-10-24T18:33:38Z
null
['CVE-2011-2930']
activerecord vulnerable to SQL Injection
Multiple SQL injection vulnerabilities in the `quote_table_name` method in the ActiveRecord adapters in `activerecord/lib/active_record/connection_adapters/` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2930'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731438'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rai...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:17Z', 'nvd_published_at': None}
1.4.0
GHSA-jmm9-2p29-vh2w
2023-05-12T17:17:16Z
2017-10-24T18:33:38Z
null
['CVE-2011-0448']
activerecord vulnerable to SQL Injection
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/354da43ab0a10b3b7b3f9cb0619aa562c3be8474'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:51Z', 'nvd_published_at': None}
1.4.0
GHSA-gjxw-5w2q-7grf
2023-05-26T16:50:51Z
2017-10-24T18:33:38Z
null
['CVE-2010-3933']
Rails activerecord gem has Improper Input Validation vulnerability
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.9'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2d96bccb1e8b62e3e11ca0c5d38aaa8cece889ae'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/96183e0f284bab27667e5a38fa6a1578eb029585'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:34Z', 'nvd_published_at': None}
1.4.0
GHSA-7g65-ghrg-hpf5
2023-01-23T16:30:29Z
2017-10-24T18:33:37Z
null
['CVE-2012-3465']
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/sanitize_helper.rb` in the `strip_tags` helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e91e4e8bbee12ce1496bf384c04da6be296b687a'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain'}, {'type...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:45Z', 'nvd_published_at': None}
1.4.0
GHSA-r5hc-9xx5-97rw
2023-07-04T00:12:42Z
2017-10-24T18:33:37Z
null
['CVE-2013-4492']
i18n gem Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://github.com/ruby-i18n/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:45Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}
1.4.0
GHSA-xwr3-fmgj-mmfr
2023-08-25T20:12:12Z
2017-10-24T18:33:36Z
null
['CVE-2013-7111']
Exposure of Sensitive Information in bio-basespace-sdk
The put_call function in the API client (`api/api_client.rb`) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the `API_KEY` on the command line, which allows remote attackers to obtain sensitive information by listing the processes.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bio-basespace-sdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bio-basespace-sdk/CVE-2013-7111.yml'}, {'type': 'WEB', 'url': 'http://www...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:47Z', 'nvd_published_at': None}
1.4.0
GHSA-xgj6-pgrm-x4r2
2023-01-26T22:31:40Z
2017-10-24T18:33:38Z
null
['CVE-2007-6183']
gtk2 vulnerable to Use of Externally-Controlled Format String
Format string vulnerability in the `mdiag_initialize` function in `gtk/src/rbgtkmessagedialog.c` in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gtk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=402871'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228174159/http://ww...
{'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:18Z', 'nvd_published_at': None}
1.4.0
GHSA-4c4w-3q45-hp9j
2023-01-25T22:56:46Z
2017-10-24T18:33:36Z
null
['CVE-2013-7463']
Aescrypt does not sufficiently use random values
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'aescrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7463'}, {'type': 'WEB', 'url': 'https://github.com/Gurpartap/aescrypt/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gurpartap/aescrypt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/aescrypt/CVE...
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:06Z', 'nvd_published_at': None}
1.4.0
GHSA-pchc-949f-53m5
2023-02-13T17:01:58Z
2017-10-24T18:33:37Z
null
['CVE-2013-0175']
Improper Input Validation in multi_xml
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity ...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'multi_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175'}, {'type': 'WEB', 'url': 'https://github.com/sferik/multi_xml/pull/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/sferik/multi_xml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0'}, ...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:50Z', 'nvd_published_at': '2013-04-25T23:55:00Z'}
1.4.0
GHSA-j96r-xvjq-r9pg
2023-01-23T17:49:35Z
2017-10-24T18:33:36Z
null
['CVE-2015-3227']
activesupport vulnerable to Denial of Service via large XML document depth
The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228041703/http://www.securityfocus.com/bid/75234'}, {'type': '...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:52Z', 'nvd_published_at': None}
1.4.0
GHSA-92w9-2pqw-rhjj
2023-01-23T16:31:49Z
2017-10-24T18:33:38Z
null
['CVE-2012-3424']
actionpack Improper Authentication vulnerability
The `decode_credentials` method in `actionpack/lib/action_controller/metal/http_authentication.rb` in Ruby on Rails before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an applicati...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.7'}]}]}, {'package': {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3424'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:14Z', 'nvd_published_at': None}
1.4.0
GHSA-fhj9-cjjh-27vm
2023-03-14T22:15:51Z
2017-10-24T18:33:37Z
null
['CVE-2013-0277']
Active Record contains deserialization of arbitrary YAML
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/v6.1.4.1/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0277.yml'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:43Z', 'nvd_published_at': None}
1.4.0
GHSA-g266-3crh-h7gj
2023-08-29T16:28:48Z
2017-10-24T18:33:37Z
null
['CVE-2013-1911']
ldoce Gem Arbitrary Command Execution
`lib/ldoce/word.rb` in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ldoce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1911'}, {'type': 'WEB', 'url': 'https://github.com/markburns/ldoce/issues/1'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83163'}, {'type': 'PACKAGE', 'url': 'https://github.com/markburns/ldoce'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:53Z', 'nvd_published_at': None}
1.4.0
GHSA-m46p-ggm5-5j83
2023-07-05T20:33:59Z
2017-10-24T18:33:36Z
null
['CVE-2014-0081']
Rails vulnerable to Cross-site Scripting
There is an XSS vulnerability in the `number_to_currency`, `number_to_percentage` and `number_to_human` helpers in Ruby on Rails. This vulnerability has been assigned the CVE identifier CVE-2014-0081. Versions Affected: All. Fixed Versions: 4.1.0.beta2, 4.0.3, 3.2.17. Impact ------ These helpers allows users to ...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosys...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/08d0a11a3f62718d601d39e617c834759cf59bbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:48Z', 'nvd_published_at': None}
1.4.0
GHSA-84fq-6626-w5fg
2020-08-31T18:07:28Z
2017-10-24T18:33:36Z
null
['CVE-2014-7193']
CORS Token Disclosure in crumb
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'crumb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'WEB', 'url': 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'ADVISORY', 'url'...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:14Z', 'nvd_published_at': '2014-12-25T11:59:00Z'}
1.4.0
GHSA-6c8p-qphv-668v
2023-06-09T20:18:48Z
2017-10-24T18:33:37Z
null
['CVE-2013-1812']
Denial of service in ruby-openid
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/pull/43'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/sh...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:51Z', 'nvd_published_at': None}
1.4.0
GHSA-v9v4-7jp6-8c73
2023-04-20T21:47:18Z
2017-10-24T18:33:38Z
null
['CVE-2011-2197']
rails Cross-site Scripting vulnerability
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string m...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/53a2c0baf2b128dd4808eca313256f6f4bb8c4cd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ed3796434af6069ced6a641293cf88eef3b284da'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:17Z', 'nvd_published_at': None}
1.4.0
GHSA-fmr4-7g9q-7hc7
2020-06-17T16:30:43Z
2017-10-24T18:33:36Z
null
[]
Moderate severity vulnerability that affects handlebars
**Withdrawn:** Duplicate of GHSA-9prh-257w-9277
[]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmr4-7g9q-7hc7'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:43Z', 'nvd_published_at': None}
1.4.0
GHSA-vm28-mrm7-fpjq
2023-08-28T16:26:10Z
2017-10-24T18:33:36Z
null
['CVE-2014-2888']
sfpagent Command Injection vulnerability
`lib/sfpagent/bsig.rb` in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sfpagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2888'}, {'type': 'PACKAGE', 'url': 'https://github.com/herry13/sfpagent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sfpagent/CVE-2014-2888.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202010...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:58Z', 'nvd_published_at': '2014-04-23T15:55:00Z'}
1.4.0
GHSA-xrr6-3pc4-m447
2023-08-25T23:37:47Z
2017-10-24T18:33:36Z
null
['CVE-2015-7577']
Active Record Improper Access Control
`activerecord/lib/active_record/nested_attributes.rb` in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2015-7577.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:28Z', 'nvd_published_at': None}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
2