schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringclasses 4
values | aliases stringlengths 2 20 | summary stringlengths 24 115 | details stringlengths 47 1.85k | severity stringclasses 24
values | affected stringlengths 90 2.44k | references stringlengths 161 4.51k | database_specific stringlengths 131 175 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-wwmf-6p58-6vj2 | 2023-06-12T16:42:56Z | 2017-10-24T18:33:38Z | null | ['CVE-2006-2582'] | Remote code execution in rwiki | The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0pre1'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-2582'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/26668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwmf-6p58-6vj2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ffpv-c4hm-3x6v | 2023-07-31T21:08:45Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-0751'] | actionpack is vulnerable to denial of service via a crafted HTTP Accept header | actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYST... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/127967b735813cd4f263df7a50426d74e7e9cc17'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/221937c8ba1d291430ceddebbd4bdef7d3cb47d6'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x85-j5j2-27jx | 2023-02-15T22:22:18Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-0130'] | actionpack Path Traversal vulnerability | Directory traversal vulnerability in `actionpack/lib/abstract_controller/base.rb` in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted reques... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0510'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0816'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:36Z', 'nvd_published_at': '2014-05-07T10:55:00Z'} |
1.4.0 | GHSA-9c2j-593q-3g82 | 2023-06-01T19:51:36Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1856'] | activesupport Improper Input Validation vulnerability | The `ActiveSupport::XmlMini_JDOM` backend in `lib/active_support/xml_mini/jdom.rb` in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary fi... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-1856.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/ru... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x457-cw4h-hq5f | 2023-06-01T19:55:21Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0269'] | JSON gem has Improper Input Validation vulnerability | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as d... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.8'}]}]}, {'package': {'ecosystem': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9rf5-jm6f-2fmm | 2023-08-25T22:56:38Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3514'] | Active Record subject to strong parameters protection bypass | `activerecord/lib/active_record/relation/query_methods.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes `create_with` calls. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': [''... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3514.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': '... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v5jg-558j-q67c | 2023-05-12T17:23:04Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2931'] | actionpack Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the `strip_tags` helper in `actionpack/lib/action_controller/vendor/html-scanner/html/node.rb` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731436'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisori... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p463-639r-q9g9 | 2023-01-23T21:27:59Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1756'] | Dragonfly Code Injection vulnerability | The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7'}, {'fixed': '0.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9'}, {'fixed': '0.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r8fh-hq2p-7qhq | 2023-03-14T22:03:04Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3483'] | Active Record contains SQL Injection via improper range quoting | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': [''... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3483'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3483.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J'}, ... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j838-vfpq-fmf2 | 2023-01-23T17:47:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1857'] | actionpack Cross-site Scripting vulnerability | The sanitize helper in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded `:` (colon) characters in URLs, which makes it easier for remote attackers to conduct ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/we... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-85r7-w5mv-c849 | 2023-08-25T23:30:15Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0262'] | Rack Vulnerable to Path Traversal | `rack/file.rb` (`Rack::File`) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted `PATH_INFO` environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909071'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_b... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:29Z', 'nvd_published_at': '2013-02-08T20:55:00Z'} |
1.4.0 | GHSA-wcm2-9c89-wmfm | 2023-02-09T19:24:11Z | 2017-10-24T18:33:38Z | null | ['CVE-2010-5312'] | Cross-site Scripting in jquery-ui | Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:08Z', 'nvd_published_at': '2014-11-24T16:59:00Z'} |
1.4.0 | GHSA-99ch-8mvp-g7m5 | 2023-01-23T16:37:19Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1948'] | md2pdf allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename | `converter.rb` in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'md2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1948'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83416'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/md2pdf/CVE-2013-1948.yml'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hjcp-j389-59ff | 2021-09-14T17:23:54Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8854'] | Regular Expression Denial of Service in marked | Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule.
## Recommendation
Update to version 0.3.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/497'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjcp-j389-59ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/chjj/marked'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvcj-pfq2-wxj7 | 2021-09-13T12:46:47Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-1202'] | High severity vulnerability that affects electron | Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/2976'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}, {'type': 'ADVISORY', 'url': 'https://github.com/adviso... | {'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c43v-hrmg-56r4 | 2023-09-05T21:12:28Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4457'] | Cocaine Gem OS Command Injection vulnerability | The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cocaine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4457'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/cocaine'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/cocaine/blob/master/NEWS.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/10/22/10'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2xjj-5x6h-8vmf | 2023-08-25T20:14:16Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-1099'] | Cross-site Scripting in actionpack | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_options_helper.rb` in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799276'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w3w8-37jv-2c58 | 2021-09-20T22:34:08Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8862'] | Cross-Site Scripting in mustache | Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommenda... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mustache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862'}, {'type': 'WEB', 'url': 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w3w8-37jv-2c58'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hpcf-8vf9-q4gj | 2023-01-26T23:02:07Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-7103'] | jQuery-UI vulnerable to Cross-site Scripting in dialog closeText | Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function.
jQuery-UI is a library for manipulating UI elements via jQuery.
Version 1.11.4 has a cross site scripting (XSS) vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ran... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'WEB', 'url': 'https://github.com/jquery/api.jqueryui.com/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1622'}, {'type': 'WEB', 'url': 'https://github.com/jquery-ui-rails/jquery-ui-rails/commit/d504... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:44Z', 'nvd_published_at': '2017-03-15T16:59:00Z'} |
1.4.0 | GHSA-24fg-p96v-hxh8 | 2023-05-26T17:41:44Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0447'] | actionpack Cross-Site Request Forgery vulnerability | Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/66ce3843d32e9f2ac3b1da20067af53019bbb034'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/7e86f9b4d2b7dfa974c10ae7e6d8ef90f3d77f06'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hgmw-x865-hf9x | 2023-01-26T20:58:07Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-2322'] | Arabic Prawn allows remote attackers to execute arbitrary commands via shell metacharacters | `lib/string_utf_support.rb` in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'Arabic-Prawn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2322'}, {'type': 'PACKAGE', 'url': 'https://github.com/ozeron/prawn-arabic'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160306235714/http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html'}, {'type': 'WEB', 'url': 'http://www.openwall... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xxvw-45rp-3mj2 | 2021-09-22T18:27:56Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4660'] | Deserialization Code Execution in js-yaml | Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer.
## Proof of Concept
```
const yaml = require('js-yaml');
const x = `test: !!js/function >
function f() {
console.log(1);
}();`
yaml.load(x);
```
## Recommendation
Update js-yaml to version 2.0.5 or l... | [] | [{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xxvw-45rp-3mj2'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:05:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g89m-3wjw-h857 | 2023-05-12T17:09:48Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3865'] | Puppet vulnerable to Path Traversal | Directory traversal vulnerability in `lib/puppet/reports/store.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a `..` (dot dot) in a node name. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5j3g-jfq3-7jwx | 2021-09-01T22:16:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7205'] | Arbitrary JavaScript Execution in bassmaster | A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval.
## Recommendation
Update to bassmaster version 1.5.2 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bassmaster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7205'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96730'}, {'type': 'ADVISORY', 'url': 'https://githu... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q44r-f2hm-v76v | 2023-05-12T17:21:34Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3867'] | Pupper does not properly restrict characters in Common Name field of Certificate Signing Request | `lib/puppet/ssl/certificate_authority.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50'}, {'type': 'WEB', ... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6h5q-96hp-9jgm | 2023-08-25T18:48:39Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6415'] | actionpack vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in the `number_to_currency` helper in `actionpack/lib/action_view/helpers/number_helper.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6415'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h5q-96hp-9jgm'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6415.yml'}, {'type': 'WEB', 'url': 'https://groups.go... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h36-4jf2-hx53 | 2023-01-23T20:56:41Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1802'] | extlib does not properly restrict casts of string values | The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2)... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'extlib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917233'}, {'type': 'PACKAGE', 'url': 'https://github.com/datamapper/extlib'}, {'type': 'WEB', 'url': 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d56... | {'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r7q2-5gqg-6c7q | 2023-05-12T17:22:22Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2929'] | actionpack Improper Input Validation vulnerability | The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731432'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rai... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rprj-g6xc-p5gq | 2023-07-04T00:25:07Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4413'] | Wicked gem contains Path traversal vulnerability | The Wicked gem prior to v1.0.1 allows a remote attacker to traverse directories on the system via a vulnerability in `controller/concerns/render_redirect.rb`. An attacker can send a specially-crafted URL request containing `%2E%2E%2F` directory traversal sequences to read arbitrary files on the system. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'wicked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413'}, {'type': 'WEB', 'url': 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783'}, {'type': 'ADVISORY', 'url': 'https://github.... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cj43-9h3w-v976 | 2022-10-04T21:44:45Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4761'] | Puppet allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service | Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.23'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4761'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-4761.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w248-xr37-jx8m | 2023-08-28T13:51:43Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2615'] | fastreader Gem for Ruby URI Handling Arbitrary Command Injection | fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fastreader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fastreader/CVE-2013-2615.yml'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html'}, {'t... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4ww3-3rxj-8v6q | 2023-05-12T15:23:22Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0449'] | actionpack allows remote attackers to bypass intended access restrictions | `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an uni... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6f80224057803f85b3f448936aae89e742452c3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionpack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-34r7-q49f-h37c | 2021-10-29T14:15:03Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8857'] | Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js | Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification.
## Recommendation
Upgrade UglifyJS to version >= 2.4.24. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.24'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uglifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857'}, {'type': 'WEB', 'url': 'https://github.com/mishoo/UglifyJS2/issues/751'}, {'type': 'WEB', 'url': 'https://github.com/lautis/uglifier/commit/4677bfe38142937ff952f95605bcec4618892c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/mishoo/Ug... | {'cwe_ids': ['CWE-1254', 'CWE-670'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:00Z', 'nvd_published_at': '2017-01-23T21:59:00Z'} |
1.4.0 | GHSA-wpw7-wxjm-cw8r | 2023-08-25T19:25:00Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6417'] | actionpack allows bypass of database-query restrictions | `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6417.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!top... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:55Z', 'nvd_published_at': '2013-12-07T00:55:00Z'} |
1.4.0 | GHSA-cqr7-78pj-3g7j | 2021-09-09T20:31:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3742'] | File Descriptor Leak Can Cause DoS Vulnerability in hapi | Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak.
When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No ot... | [] | [{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742'}, {'type': 'WEB', 'url': 'https://github.com/spumko/hapi/issues/1427'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/hapi'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3crr-9vmg-864v | 2023-08-25T23:15:31Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1854'] | Active Record Improper Input Validation | The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0699'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1854'}, {'type': '... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:54Z', 'nvd_published_at': '2013-03-19T22:55:00Z'} |
1.4.0 | GHSA-p673-hjf2-pwfr | 2023-07-03T23:38:02Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1875'] | Shell command injection in command_wrap | command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'command_wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p673-hjf2-pwfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/command_wrap/CVE-2013-1875.yml'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q86f-fmqf-qrf6 | 2023-09-05T21:08:32Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-9097'] | Mail Gem CRLF Injection vulnerability | The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/issues/215'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/pull/1097'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa... | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mhwp-qhpc-h3jm | 2023-03-14T20:49:26Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3482'] | SQL Injection in Active Record | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3482'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0876.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m7fq-cf8q-35q7 | 2023-01-23T21:21:34Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1800'] | crack does not properly restrict casts of string values | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) S... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'crack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=804721'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com... | {'cwe_ids': ['CWE-704', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-959j-5g9v-3fpq | 2023-08-25T22:59:09Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-1234'] | Paratrooper-newrelic Exposes of Sensitive Information to an Unauthorized Actor | The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-newrelic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-newrelic/CVE-2014-1234.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/2'}, {'type': 'WEB', 'url': 'http://www... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-33pp-3763-mrfp | 2023-03-01T18:54:54Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7819'] | sprockets vulnerable to Path Traversal | Multiple directory traversal vulnerabilities in `server.rb` in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'eco... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1161527'}, {'type... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:55Z', 'nvd_published_at': '2014-11-08T11:55:00Z'} |
1.4.0 | GHSA-4whc-pp4x-9pf3 | 2023-01-20T22:28:49Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-1840'] | jquery-rails and jquery-ujs subject to Exposure of Sensitive Information | jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL with... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/jquery-rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md'},... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vxp4-25qp-86qh | 2020-06-17T15:15:14Z | 2017-10-24T18:33:36Z | 2020-06-17T15:15:14Z | [] | Moderate severity vulnerability that affects ember | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'n... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vxp4-25qp-86qh'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghqm-pgxj-37gq | 2023-01-23T21:16:04Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7580'] | rails-html-sanitizer Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `lib/rails/html/scrubbers.rb` in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.go... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-75w6-p6mg-vh8j | 2023-05-26T16:09:49Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0446'] | Rails actionpack gem vulnerable to Cross-site Scripting | Multiple cross-site scripting (XSS) vulnerabilities in the `mail_to` helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0446'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/abe97736b8316f1b714cac56c115c0779aa73217'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e3dd2107c57a8efaaea5d61cf8da65f7444760b2'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q5pq-pgrv-fh89 | 2023-09-05T23:30:40Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-9682'] | dns-sync command injection vulnerability | The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function. | [] | [{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}, {'type': 'ADVISORY', 'url': 'https://github.c... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-699m-mcjm-9cw8 | 2023-08-25T19:05:47Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4491'] | actionpack vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/translation_helper.rb` in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-699m-mcjm-9cw8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-4491.yml'}, {'type': 'WEB', 'url': 'https://groups.go... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3m6r-39p3-jq25 | 2022-04-25T16:34:57Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-6582'] | Doorkeeper is vulnerable to replay attacks | The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3m6r-39p3-jq25'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/'}... | {'cwe_ids': ['CWE-1254'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q34c-48gc-m9g8 | 2023-05-12T17:20:28Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2694'] | actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request | `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restriction... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2694.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrai... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xwg4-93c6-3h42 | 2021-09-22T17:58:56Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-6394'] | Directory Traversal in send | Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.
For example, `static(_dirname + '/... | [] | [{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_b... | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rg5m-3fqp-6px8 | 2023-07-04T00:18:31Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4389'] | actionmailer email address processing causes Denial of service | Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4389'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rg5m-3fqp-6px8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionmailer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/... | {'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-229r-pqp6-8w6g | 2023-08-29T15:58:19Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6421'] | sprout Arbitrary Code Execution vulnerability | The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sprout'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.7.246']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6421'}, {'type': 'PACKAGE', 'url': 'https://github.com/lukebayes/project-sprouts'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sprout/CVE-2013-6421.yml'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.c... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4936-rj25-6wm6 | 2023-01-20T22:08:42Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0285'] | nori contains Improper Input Validation | The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity refe... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0285'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/2ca6f8603e406f884a8fcea6bc26f8f6bf168f40'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/4bcf59abdcec6bcd1153241b122eda61a494e4fb'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9959-c6q6-6qp3 | 2020-06-17T16:30:41Z | 2017-10-24T18:33:36Z | 2020-06-17T16:30:41Z | [] | Moderate severity vulnerability that affects validator | **Withdrawn:** Duplicate of GHSA-79mx-88w7-8f7q | [] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9959-c6q6-6qp3'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rgr4-9jh5-j4j6 | 2023-03-14T21:47:07Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3225'] | Rack vulnerable to Denial of Service via large parameter depth request | lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/HISTORY.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-32... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rp63-jfmw-532w | 2023-09-05T22:04:31Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2140'] | Mail Gem Improper Input Validation vulnerability | The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-333x-9vgq-v2j4 | 2021-08-31T20:33:50Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-5688'] | Directory Traversal in geddy | Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
### Proof of Concept
```
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
```
## Recommendation
Update geddy to version >= 13.0.8 | [] | [{'package': {'ecosystem': 'npm', 'name': 'geddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/issues/697'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/pull/699'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'}... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jgqf-hwc5-hh37 | 2021-09-14T19:42:25Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8859'] | Root Path Disclosure in send | Versions of `send` prior to 0.11.2 are affected by an information leakage vulnerability which may allow an attacker to enumerate paths on the server filesystem.
## Recommendation
Update to version 0.11.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8859'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/pull/70'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/commit/98a5b89982b38e79db684177cf94730ce7fc7aed'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-stati... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fgmx-8h93-26fh | 2023-01-25T23:20:49Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6134'] | omniauth-oauth2 Cross-Site Request Forgery vulnerability | Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem prior to 1.1.1 for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-oauth2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/intridea/omniauth-oauth2/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/Shopify/omniauth-shopify-oaut... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fg9w-g6m4-557j | 2023-05-26T17:12:19Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-3086'] | actionpack and activesupport vulnerable to information leaks | A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3086'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/674f780d59a5a7ec0301755d43a7b277a3ad2978'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pr3r-4wrp-r2pv | 2023-07-04T00:01:26Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-6317'] | ActiveRecord in Ruby on Rails allows database-query bypass | Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a cr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2016-6317.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-284', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qv8p-v9qw-wc7g | 2023-01-23T18:01:41Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-1098'] | activesupport Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'pa... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799275'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://list... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f522-ffg8-j8r6 | 2021-09-09T21:38:37Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-2537'] | Regular Expression Denial of Service in is-my-json-valid | Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.
## Recommendation
Update to version 1.4.1, 2.17.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}, {'type': 'WEB', 'url': 'https://githu... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c9f4-xj24-8jqx | 2021-09-08T21:59:09Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8858'] | Regular Expression Denial of Service in uglify-js | Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method.
### Proof of Concept
```
var u = require('uglify-js');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9f4-xj24-8jqx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/48'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'W... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m6f7-46hw-grcj | 2023-03-14T20:44:40Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2090'] | Creme Fraiche contains OS Command Injection | The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cremefraiche'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2090'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-67j6-xv27-w6ww | 2023-03-14T23:11:59Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3224'] | Web Console (Ruby gem) contains whitelisted_ips bypass | request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/web-console'}, {'type': 'WEB', 'url': 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/mast... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x6fg-f45m-jf5q | 2021-09-21T22:15:35Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8855'] | Regular Expression Denial of Service in semver | Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Recommendation
Update to version 4.3.2 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x6fg-f45m-jf5q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/31'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r23g-3qw4-gfh2 | 2023-08-28T19:55:45Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6684'] | RedCloth Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a `javascript:` URI. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6684'}, {'type': 'WEB', 'url': 'https://co3k.org/blog/redcloth-unfixed-xss-en'}, {'type': 'WEB', 'url': 'https://gist.github.com/co3k/75b3cb416c342aa1414c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/RedCl... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rh6c-q938-3r9q | 2021-09-17T18:17:08Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7452'] | Moderate severity vulnerability that affects validator | The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7452'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rh6c-q938-3r9q'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxx6-p24v-wg8c | 2023-08-29T10:57:50Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2617'] | Curl Gem insufficient URL escaping command injection | `lib/curl.rb` in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'curl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2617'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curl/CVE-2013-2617.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tggo/curl'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120778/R... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gcqq-w6gr-h9j9 | 2023-01-26T20:55:34Z | 2017-10-24T18:33:35Z | null | ['CVE-2017-5946'] | Directory traversal vulnerability in RubyZip | The `Zip::File` component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses `../` pathname substrings to write arbitrary files to the filesystem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/issues/315'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/commit/ce4208fdecc2ad079b05d3c49d70fe6ed1d07016'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-a... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p4c6-77gc-694x | 2023-05-11T13:54:28Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-6077'] | session fixation protection mechanism in cgi_process.rb in Rails | The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct s... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p4c6-77gc-694x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-6077.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.or... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7p5-w2cr-7cp7 | 2023-05-12T17:27:38Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-3567'] | Puppet Improper Input Validation vulnerability | Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.22'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pc3m-v286-2jwj | 2023-01-23T17:59:42Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-6316'] | actionview Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6h88-qjpv-p32m | 2022-04-25T16:33:57Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-7798'] | OpenSSL gem for Ruby using inadequate encryption strength | The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/issues/49'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-... | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gm25-fpmr-43fj | 2023-05-11T13:41:22Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-3227'] | Moderate severity vulnerability that affects rails | Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gm25-fpmr-43fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cpjc-p7fc-j9xh | 2023-01-23T21:15:08Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0739'] | Mail Improper Input Validation vulnerability | The deliver function in the sendmail delivery agent (`lib/mail/network/delivery_methods/sendmail.rb`) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0739'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/65010'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.pa... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h56m-vwxc-3qpw | 2023-08-25T19:56:49Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7829'] | Directory traversal vulnerability in actionpack | Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h56m-vwxc-3qpw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7829.yml'}, {'type': 'WEB', 'url': 'https://groups.go... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:46Z', 'nvd_published_at': '2014-11-18T23:59:00Z'} |
1.4.0 | GHSA-98mf-8f57-64qf | 2023-01-23T16:34:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3463'] | actionpack Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_tag_helper.rb` in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the `prompt` field to the `select_tag` helper. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6d0526db91afb0675c2ad3d871529d1536303c64'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/fV3QUToSMSw/m/eHBSFOUYHpYJ?pli=1'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p692-7mm3-3fxg | 2023-07-31T20:59:11Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7576'] | actionpack is vulnerable to remote bypass authentication | The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/17e6f1507b7f2c2a883c180f4f9548445d6dfbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-92v7-pq4h-58j5 | 2023-06-07T14:06:11Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3248'] | facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability | Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/facter/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/hiera/CVE-2014-3248.yml'}, {'type': 'WEB',... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:08Z', 'nvd_published_at': '2014-11-16T17:59:00Z'} |
1.4.0 | GHSA-hgpp-pp89-4fgf | 2023-08-25T23:26:17Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2660'] | Action Pack contains database-query restrictions bypass | `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restriction... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2660'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advis... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-29gr-w57f-rpfw | 2023-08-25T19:41:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7818'] | actionpack vulnerable to Path Traversal | Directory traversal vulnerability in `actionpack/lib/action_dispatch/middleware/static.rb` in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when `serve_static_assets` is enabled, allows remote attackers to determine the existence of files outside ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gr-w57f-rpfw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7818.yml'}, {'type': 'WEB', 'url': 'https://groups.go... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:48Z', 'nvd_published_at': '2014-11-08T11:55:00Z'} |
1.4.0 | GHSA-xgr2-v94m-rc9g | 2023-08-25T20:10:51Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0333'] | activesupport in Rails vulnerable to incorrect data conversion | `lib/active_support/json/backends/yaml.rb` in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.2'}, {'fixed': '2.3.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0202'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0203'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:24Z', 'nvd_published_at': '2013-01-30T12:00:00Z'} |
1.4.0 | GHSA-9hx9-w2j6-rw76 | 2023-07-05T18:52:49Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2105'] | Script Injection in Show In Browser gem | The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on `/tmp/browser.html`. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'show_in_browser'}, 'versions': ['0.0.3']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob... | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7fqj-cg79-f2pv | 2023-08-28T13:54:43Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1898'] | Thumbshooter vulnerable to Code Injection | lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'thumbshooter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898'}, {'type': 'PACKAGE', 'url': 'https://github.com/digineo/thumbshooter'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thumbshooter/CVE-2013-1898.yml'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldi... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j5hj-fhc9-g24m | 2023-01-23T21:18:15Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-4442'] | rack-mini-profiler allows remote attackers to obtain sensitive information about allocated strings and objects | The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c'}, {'type': 'PACKAGE', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h835-75hw-pj89 | 2023-01-23T17:34:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3464'] | activesupport Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.rb` in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'packag... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3464'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/7215'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/28f2c6f4037081da0a82104a3f473165ed4ed2ce'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/78... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gh2w-j7cx-2664 | 2023-03-14T19:07:57Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6496'] | Active Record contains SQL Injection | SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types i... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.9'}]}]}, {'package'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6496'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=889649'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://blo... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wrq-xvmp-xjc8 | 2021-12-01T19:40:37Z | 2017-10-24T18:33:38Z | null | ['CVE-2006-4112'] | High severity vulnerability that affects rails. | Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': '... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jwhv-rgqc-fqj5 | 2023-05-11T13:50:52Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-5380'] | Session fixation vulnerability in Rails | Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxhj-hp9m-qwc4 | 2023-01-23T17:38:44Z | 2017-11-29T23:21:05Z | null | ['CVE-2017-0904'] | private_address_check vulnerable to bypass of Resolv.getaddresses method | The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's `Resolv.getaddresses` method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-242'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7p2-x2j6-mwhr | 2023-08-29T12:26:53Z | 2017-11-29T23:19:51Z | null | ['CVE-2017-16833'] | Gemirro Stored XSS in Gemspec "homepage" value | Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file.
A ".gemspec" file must be created with a JavaScript URL in the homepage value. This can be used to build a gem for upload ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gemirro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833'}, {'type': 'WEB', 'url': 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}, {'type': 'PACKAGE', 'url': 'https://github.com/PierreRambaud/gemirro'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7qcx-jmrc-h2rr | 2021-09-03T21:41:16Z | 2017-11-15T19:44:16Z | null | ['CVE-2017-15878'] | Cross-Site Scripting in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'W... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rph7-j9qr-h8q8 | 2021-09-17T19:23:32Z | 2017-11-28T22:20:17Z | null | ['CVE-2013-7377'] | Potential Command Injection in codem-transcode | When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution.
### Mitigating Factors... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'codem-transcode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hwcf-pp87-7x6p | 2023-09-08T21:35:56Z | 2017-11-30T23:15:05Z | null | ['CVE-2017-1000188'] | mde ejs vulnerable to XSS | nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the `ejs.renderFile()` resulting in code injection | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188'}, {'type': 'WEB', 'url': 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}, {'type': 'PACKAGE', 'url': 'https://github.com/mde/ej... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5c8j-xr24-2665 | 2021-09-01T21:34:20Z | 2017-11-28T22:44:52Z | null | ['CVE-2014-3741'] | Potential Command Injection in printer | Versions 0.0.1 and earlier of `printer` are affected by a command injection vulnerability resulting from a failure to sanitize command arguments properly in the `printDirect()` function.
## Recommendation
Update to version 0.0.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'printer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3741'}, {'type': 'WEB', 'url': 'https://github.com/tojocky/node-printer/commit/e001e38738c17219a1d9dd8c31f7d82b9c0013c7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5c8j-xr24-2665'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjj4-w39g-pw54 | 2023-01-26T21:23:13Z | 2017-11-21T18:26:40Z | null | ['CVE-2017-15928'] | Ox gem crashes due to a crafted input | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to `parse_obj`. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15928'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/ox/issues/194'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohler55/ox'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ox/CVE-2017-15928.yml'}, ... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q43c-g2g7-6gxj | 2021-06-10T21:18:39Z | 2017-11-30T23:14:47Z | null | ['CVE-2017-16570'] | Cross-Site Request Forgery (CSRF) in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints.
## Recommendation
Update to version 4.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj'}, {'t... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:45Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.