schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
4 values
aliases
stringlengths
2
20
summary
stringlengths
24
115
details
stringlengths
47
1.85k
severity
stringclasses
24 values
affected
stringlengths
90
2.44k
references
stringlengths
161
4.51k
database_specific
stringlengths
131
175
1.4.0
GHSA-5v3f-73gv-x7x5
2023-08-28T10:13:34Z
2017-11-15T20:41:14Z
null
['CVE-2017-7475']
cairo is vulnerable to denial of service due to a null pointer dereference
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the `FT_Load_Glyph` and `FT_Render_Glyph` resulting in an application crash.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cairo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.4'}, {'fixed': '1.15.5'}]}], 'versions': ['1.15.4']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475'}, {'type': 'WEB', 'url': 'https://bugs.freedesktop.org/show_bug.cgi?id=100763'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcairo/rcairo'}, {'type': 'WE...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:22Z', 'nvd_published_at': '2017-05-19T20:29:00Z'}
1.4.0
GHSA-653m-r33x-39ff
2023-03-14T23:07:43Z
2017-11-29T23:20:14Z
null
['CVE-2017-16792']
Geminabox contains Cross-site Scripting
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/ge...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:04Z', 'nvd_published_at': None}
1.4.0
GHSA-wwh7-4jw9-33x6
2023-08-29T16:04:20Z
2017-11-28T22:44:42Z
null
['CVE-2017-16516']
yajl-ruby gem Denial of Service vulnerability
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to `Yajl::Parser.new.parse`, the whole ruby process crashes with a SIGABRT in the `yajl_string_decode` function in `yajl_encode.c`. This results in the whole ruby process terminating and potentially a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'yajl-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2158'}, {'ty...
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:25Z', 'nvd_published_at': None}
1.4.0
GHSA-7cv6-gvx3-m54m
2021-06-11T13:54:39Z
2017-11-16T01:47:02Z
null
['CVE-2017-15881']
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account. #...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m'}, {'t...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:30Z', 'nvd_published_at': None}
1.4.0
GHSA-q97v-764g-r2rp
2023-01-23T21:34:16Z
2017-11-16T01:47:37Z
null
['CVE-2014-9489']
gollum and gollum-lib allow remote authenticated users to execute arbitrary code
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string `master` is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the `-O` or `--open-files-in-pager` flags.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'gollum-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/913'}, {'type': 'WEB', 'url': 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/g...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:32Z', 'nvd_published_at': None}
1.4.0
GHSA-3w5v-p54c-f74x
2023-09-08T20:54:25Z
2017-11-30T23:15:19Z
null
['CVE-2017-1000228']
ejs is vulnerable to remote code execution due to weak input validation
nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in `ejs.renderFile()` function
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.5.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w5v-p54c-f74x'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ejs:20161128'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041219/http://www.securityfocu...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:38Z', 'nvd_published_at': None}
1.4.0
GHSA-wmjf-jpjj-9f3j
2023-08-28T13:43:41Z
2017-11-15T20:39:47Z
null
['CVE-2017-8418']
RuboCop gem Insecure use of /tmp
RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubocop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.49.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'}, {'type': 'WEB', 'url': 'https://github.com/bbatsov/rubocop/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/rubocop/rubocop/commit/dcb258fabd5f2624c1ea0e1634763094590c09d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbatsov/r...
{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:50Z', 'nvd_published_at': None}
1.4.0
GHSA-3v3c-r5v2-68ph
2023-01-20T22:07:25Z
2017-11-30T23:14:55Z
null
['CVE-2017-0909']
private_address_check contains Incomplete List of Disallowed Inputs
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}, {'type': '...
{'cwe_ids': ['CWE-184'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:20Z', 'nvd_published_at': None}
1.4.0
GHSA-mw35-24gh-f82w
2023-09-08T19:56:20Z
2017-11-15T20:41:51Z
null
['CVE-2017-7474']
keycloak-connect and keycloak-js improperly handle invalid tokens
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'keycloak-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-1203.html'}]
{'cwe_ids': ['CWE-253'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:26Z', 'nvd_published_at': None}
1.4.0
GHSA-6494-v9fq-fgq2
2022-04-25T22:05:05Z
2017-11-16T01:46:50Z
null
['CVE-2017-15879']
Keystone is vulnerable to CSV injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6494-v9fq-fgq2'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144755/KeystoneJS-4...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:57Z', 'nvd_published_at': None}
1.4.0
GHSA-x27v-x225-gq8g
2023-08-29T15:38:45Z
2017-12-06T16:43:00Z
null
['CVE-2017-0905']
Recurly gem Server-Side Request Forgery in Resource#find method
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource#find` method that could result in compromise of API keys or other critical resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'rang...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'PACKAGE', 'url': 'https://github.com/recurly...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:40Z', 'nvd_published_at': None}
1.4.0
GHSA-gj4p-3wh3-2rmf
2023-07-05T17:53:08Z
2017-12-21T00:47:25Z
null
['CVE-2017-17042']
Arbitrary file read vulnerability in yard server
`lib/yard/core_ext/file.rb` in the server in YARD before 0.9.11 does not block relative paths with an initial `../` sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042'}, {'type': 'WEB', 'url': 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/lseg...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:31Z', 'nvd_published_at': None}
1.4.0
GHSA-vx5c-87qx-cv6c
2021-06-10T20:06:12Z
2017-12-18T22:27:45Z
null
['CVE-2017-1001002']
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. ## Recommendation Update to version 3.17.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c'}, {'type': 'WEB', 'url': 'https://github.com/j...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:44Z', 'nvd_published_at': None}
1.4.0
GHSA-pv8x-p9hq-j328
2023-09-12T18:41:33Z
2017-12-18T22:27:53Z
null
['CVE-2017-1001003']
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object. ## Recommendation Upgrade to version 3.17.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv8x-p9hq-j328'}, {'type': 'WEB', 'url': 'https://github.com/j...
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:06Z', 'nvd_published_at': None}
1.4.0
GHSA-3rpr-mg43-xhq4
2023-09-13T22:14:09Z
2017-12-21T00:47:20Z
null
['CVE-2017-17068']
auth0-js Privilege Escalation Vulnerability
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions &lt; 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with `auth0.popup.callback()`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-17068'}, {'type': 'ADVISORY', 'url': 'https://gith...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:17Z', 'nvd_published_at': '2017-12-06T19:29:00Z'}
1.4.0
GHSA-7fpw-cfc4-3p2c
2023-06-21T22:00:08Z
2017-12-28T22:51:45Z
2023-06-21T22:00:08Z
[]
Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of GHSA-77fw-rf4v-vfp9. This link is maintained to preserve external references. ## Original Description A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16897'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-16897'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}]
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:38Z', 'nvd_published_at': None}
1.4.0
GHSA-h9mj-fghc-664w
2021-09-14T17:16:40Z
2017-12-28T22:51:58Z
null
['CVE-2017-10910']
Denial of Service in mqtt
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. ## Proof of Concept The following i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mqtt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9mj-fghc-664w'}, {'type': 'PACKAGE', 'url': 'https://github.com/m...
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:48Z', 'nvd_published_at': None}
1.4.0
GHSA-pm9p-9926-w68m
2021-09-16T18:15:09Z
2017-12-28T22:52:47Z
null
['CVE-2016-10703']
Denial of Service in ecstatic
`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory. [Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:34Z', 'nvd_published_at': '2017-12-14T19:29:00Z'}
1.4.0
GHSA-2w67-526p-gm73
2023-03-14T21:11:23Z
2017-12-06T16:41:25Z
null
['CVE-2017-1000248']
redis-store deserializes untrusted data
Redis-store prior to 1.4.0 allows unsafe objects to be loaded from redis
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'redis-store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000248'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/ce13252c26fcc40ed4935c9abfeb0ee0761e5704'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}, {...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:06Z', 'nvd_published_at': None}
1.4.0
GHSA-8c56-cpmw-89x7
2021-06-30T18:05:23Z
2017-12-13T21:38:24Z
null
['CVE-2017-9050']
Out-of-bounds read in nokogiri
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses li...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-01'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3952'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:13Z', 'nvd_published_at': '2017-05-18T06:29:00Z'}
1.4.0
GHSA-3f5c-4qxj-vmpf
2023-09-05T22:34:28Z
2017-12-05T02:04:14Z
null
['CVE-2017-16877']
Next.js Directory Traversal Vulnerability
Next.js before 2.4.1 has directory traversal under the `/_next` and `/static` request namespace, allowing attackers to obtain sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/2.4.1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:56Z', 'nvd_published_at': None}