schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringclasses 4
values | aliases stringlengths 2 20 | summary stringlengths 24 115 | details stringlengths 47 1.85k | severity stringclasses 24
values | affected stringlengths 90 2.44k | references stringlengths 161 4.51k | database_specific stringlengths 131 175 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-5v3f-73gv-x7x5 | 2023-08-28T10:13:34Z | 2017-11-15T20:41:14Z | null | ['CVE-2017-7475'] | cairo is vulnerable to denial of service due to a null pointer dereference | Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the `FT_Load_Glyph` and `FT_Render_Glyph` resulting in an application crash. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cairo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.4'}, {'fixed': '1.15.5'}]}], 'versions': ['1.15.4']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475'}, {'type': 'WEB', 'url': 'https://bugs.freedesktop.org/show_bug.cgi?id=100763'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcairo/rcairo'}, {'type': 'WE... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:22Z', 'nvd_published_at': '2017-05-19T20:29:00Z'} |
1.4.0 | GHSA-653m-r33x-39ff | 2023-03-14T23:07:43Z | 2017-11-29T23:20:14Z | null | ['CVE-2017-16792'] | Geminabox contains Cross-site Scripting | Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/ge... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwh7-4jw9-33x6 | 2023-08-29T16:04:20Z | 2017-11-28T22:44:42Z | null | ['CVE-2017-16516'] | yajl-ruby gem Denial of Service vulnerability | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to `Yajl::Parser.new.parse`, the whole ruby process crashes with a SIGABRT in the `yajl_string_decode` function in `yajl_encode.c`. This results in the whole ruby process terminating and potentially a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'yajl-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2158'}, {'ty... | {'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7cv6-gvx3-m54m | 2021-06-11T13:54:39Z | 2017-11-16T01:47:02Z | null | ['CVE-2017-15881'] | Cross-Site Scripting in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account.
#... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m'}, {'t... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q97v-764g-r2rp | 2023-01-23T21:34:16Z | 2017-11-16T01:47:37Z | null | ['CVE-2014-9489'] | gollum and gollum-lib allow remote authenticated users to execute arbitrary code | The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string `master` is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the `-O` or `--open-files-in-pager` flags. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'gollum-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/913'}, {'type': 'WEB', 'url': 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/g... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3w5v-p54c-f74x | 2023-09-08T20:54:25Z | 2017-11-30T23:15:19Z | null | ['CVE-2017-1000228'] | ejs is vulnerable to remote code execution due to weak input validation | nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in `ejs.renderFile()` function | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.5.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w5v-p54c-f74x'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ejs:20161128'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041219/http://www.securityfocu... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wmjf-jpjj-9f3j | 2023-08-28T13:43:41Z | 2017-11-15T20:39:47Z | null | ['CVE-2017-8418'] | RuboCop gem Insecure use of /tmp | RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubocop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.49.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'}, {'type': 'WEB', 'url': 'https://github.com/bbatsov/rubocop/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/rubocop/rubocop/commit/dcb258fabd5f2624c1ea0e1634763094590c09d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbatsov/r... | {'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3v3c-r5v2-68ph | 2023-01-20T22:07:25Z | 2017-11-30T23:14:55Z | null | ['CVE-2017-0909'] | private_address_check contains Incomplete List of Disallowed Inputs | The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}, {'type': '... | {'cwe_ids': ['CWE-184'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mw35-24gh-f82w | 2023-09-08T19:56:20Z | 2017-11-15T20:41:51Z | null | ['CVE-2017-7474'] | keycloak-connect and keycloak-js improperly handle invalid tokens | It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'keycloak-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-1203.html'}] | {'cwe_ids': ['CWE-253'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6494-v9fq-fgq2 | 2022-04-25T22:05:05Z | 2017-11-16T01:46:50Z | null | ['CVE-2017-15879'] | Keystone is vulnerable to CSV injection | CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6494-v9fq-fgq2'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144755/KeystoneJS-4... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x27v-x225-gq8g | 2023-08-29T15:38:45Z | 2017-12-06T16:43:00Z | null | ['CVE-2017-0905'] | Recurly gem Server-Side Request Forgery in Resource#find method | The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource#find` method that could result in compromise of API keys or other critical resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'rang... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'PACKAGE', 'url': 'https://github.com/recurly... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gj4p-3wh3-2rmf | 2023-07-05T17:53:08Z | 2017-12-21T00:47:25Z | null | ['CVE-2017-17042'] | Arbitrary file read vulnerability in yard server | `lib/yard/core_ext/file.rb` in the server in YARD before 0.9.11 does not block relative paths with an initial `../` sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042'}, {'type': 'WEB', 'url': 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/lseg... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vx5c-87qx-cv6c | 2021-06-10T20:06:12Z | 2017-12-18T22:27:45Z | null | ['CVE-2017-1001002'] | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
## Recommendation
Update to version 3.17.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c'}, {'type': 'WEB', 'url': 'https://github.com/j... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv8x-p9hq-j328 | 2023-09-12T18:41:33Z | 2017-12-18T22:27:53Z | null | ['CVE-2017-1001003'] | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object.
## Recommendation
Upgrade to version 3.17.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv8x-p9hq-j328'}, {'type': 'WEB', 'url': 'https://github.com/j... | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3rpr-mg43-xhq4 | 2023-09-13T22:14:09Z | 2017-12-21T00:47:20Z | null | ['CVE-2017-17068'] | auth0-js Privilege Escalation Vulnerability | A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with `auth0.popup.callback()`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-17068'}, {'type': 'ADVISORY', 'url': 'https://gith... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:17Z', 'nvd_published_at': '2017-12-06T19:29:00Z'} |
1.4.0 | GHSA-7fpw-cfc4-3p2c | 2023-06-21T22:00:08Z | 2017-12-28T22:51:45Z | 2023-06-21T22:00:08Z | [] | Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2 | ## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of GHSA-77fw-rf4v-vfp9. This link is maintained to preserve external references.
## Original Description
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16897'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-16897'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}] | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h9mj-fghc-664w | 2021-09-14T17:16:40Z | 2017-12-28T22:51:58Z | null | ['CVE-2017-10910'] | Denial of Service in mqtt | Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
## Proof of Concept
The following i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mqtt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9mj-fghc-664w'}, {'type': 'PACKAGE', 'url': 'https://github.com/m... | {'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pm9p-9926-w68m | 2021-09-16T18:15:09Z | 2017-12-28T22:52:47Z | null | ['CVE-2016-10703'] | Denial of Service in ecstatic | `ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory.
[Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:34Z', 'nvd_published_at': '2017-12-14T19:29:00Z'} |
1.4.0 | GHSA-2w67-526p-gm73 | 2023-03-14T21:11:23Z | 2017-12-06T16:41:25Z | null | ['CVE-2017-1000248'] | redis-store deserializes untrusted data | Redis-store prior to 1.4.0 allows unsafe objects to be loaded from redis | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'redis-store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000248'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/ce13252c26fcc40ed4935c9abfeb0ee0761e5704'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}, {... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8c56-cpmw-89x7 | 2021-06-30T18:05:23Z | 2017-12-13T21:38:24Z | null | ['CVE-2017-9050'] | Out-of-bounds read in nokogiri | libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses li... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-01'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3952'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:13Z', 'nvd_published_at': '2017-05-18T06:29:00Z'} |
1.4.0 | GHSA-3f5c-4qxj-vmpf | 2023-09-05T22:34:28Z | 2017-12-05T02:04:14Z | null | ['CVE-2017-16877'] | Next.js Directory Traversal Vulnerability | Next.js before 2.4.1 has directory traversal under the `/_next` and `/static` request namespace, allowing attackers to obtain sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/2.4.1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:56Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.