schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
4 values
aliases
stringlengths
2
20
summary
stringlengths
24
115
details
stringlengths
47
1.85k
severity
stringclasses
24 values
affected
stringlengths
90
2.44k
references
stringlengths
161
4.51k
database_specific
stringlengths
131
175
1.4.0
GHSA-5v3f-73gv-x7x5
2023-08-28T10:13:34Z
2017-11-15T20:41:14Z
null
['CVE-2017-7475']
cairo is vulnerable to denial of service due to a null pointer dereference
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the `FT_Load_Glyph` and `FT_Render_Glyph` resulting in an application crash.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cairo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.4'}, {'fixed': '1.15.5'}]}], 'versions': ['1.15.4']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475'}, {'type': 'WEB', 'url': 'https://bugs.freedesktop.org/show_bug.cgi?id=100763'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcairo/rcairo'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cairo/CVE-2017-7475.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2017/q2/151'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:22Z', 'nvd_published_at': '2017-05-19T20:29:00Z'}
1.4.0
GHSA-653m-r33x-39ff
2023-03-14T23:07:43Z
2017-11-29T23:20:14Z
null
['CVE-2017-16792']
Geminabox contains Cross-site Scripting
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/geminabox/versions/0.13.10'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:04Z', 'nvd_published_at': None}
1.4.0
GHSA-wwh7-4jw9-33x6
2023-08-29T16:04:20Z
2017-11-28T22:44:42Z
null
['CVE-2017-16516']
yajl-ruby gem Denial of Service vulnerability
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to `Yajl::Parser.new.parse`, the whole ruby process crashes with a SIGABRT in the `yajl_string_decode` function in `yajl_encode.c`. This results in the whole ruby process terminating and potentially a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'yajl-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2158'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianmario/yajl-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yajl-ruby/CVE-2017-16516.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00003.html'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/yajl-ruby'}]
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:25Z', 'nvd_published_at': None}
1.4.0
GHSA-7cv6-gvx3-m54m
2021-06-11T13:54:39Z
2017-11-16T01:47:02Z
null
['CVE-2017-15881']
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account. ## Recommendation Update to version 4.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/981'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101541'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:30Z', 'nvd_published_at': None}
1.4.0
GHSA-q97v-764g-r2rp
2023-01-23T21:34:16Z
2017-11-16T01:47:37Z
null
['CVE-2014-9489']
gollum and gollum-lib allow remote authenticated users to execute arbitrary code
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string `master` is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the `-O` or `--open-files-in-pager` flags.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'gollum-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/913'}, {'type': 'WEB', 'url': 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/gollum'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229041306/http://www.securityfocus.com/bid/71499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/03/19'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:32Z', 'nvd_published_at': None}
1.4.0
GHSA-3w5v-p54c-f74x
2023-09-08T20:54:25Z
2017-11-30T23:15:19Z
null
['CVE-2017-1000228']
ejs is vulnerable to remote code execution due to weak input validation
nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in `ejs.renderFile()` function
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.5.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w5v-p54c-f74x'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ejs:20161128'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041219/http://www.securityfocus.com/bid/101897'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:38Z', 'nvd_published_at': None}
1.4.0
GHSA-wmjf-jpjj-9f3j
2023-08-28T13:43:41Z
2017-11-15T20:39:47Z
null
['CVE-2017-8418']
RuboCop gem Insecure use of /tmp
RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubocop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.49.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'}, {'type': 'WEB', 'url': 'https://github.com/bbatsov/rubocop/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/rubocop/rubocop/commit/dcb258fabd5f2624c1ea0e1634763094590c09d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbatsov/rubocop'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubocop/CVE-2017-8418.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/01/14'}]
{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:50Z', 'nvd_published_at': None}
1.4.0
GHSA-3v3c-r5v2-68ph
2023-01-20T22:07:25Z
2017-11-30T23:14:55Z
null
['CVE-2017-0909']
private_address_check contains Incomplete List of Disallowed Inputs
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}, {'type': 'PACKAGE', 'url': 'https://github.com/jtdowney/private_address_check'}]
{'cwe_ids': ['CWE-184'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:20Z', 'nvd_published_at': None}
1.4.0
GHSA-mw35-24gh-f82w
2023-09-08T19:56:20Z
2017-11-15T20:41:51Z
null
['CVE-2017-7474']
keycloak-connect and keycloak-js improperly handle invalid tokens
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'keycloak-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-1203.html'}]
{'cwe_ids': ['CWE-253'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:26Z', 'nvd_published_at': None}
1.4.0
GHSA-6494-v9fq-fgq2
2022-04-25T22:05:05Z
2017-11-16T01:46:50Z
null
['CVE-2017-15879']
Keystone is vulnerable to CSV injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6494-v9fq-fgq2'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43053/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:57Z', 'nvd_published_at': None}
1.4.0
GHSA-x27v-x225-gq8g
2023-08-29T15:38:45Z
2017-12-06T16:43:00Z
null
['CVE-2017-0905']
Recurly gem Server-Side Request Forgery in Resource#find method
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource#find` method that could result in compromise of API keys or other critical resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'PACKAGE', 'url': 'https://github.com/recurly/recurly-client-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/recurly/CVE-2017-0905.yml'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:40Z', 'nvd_published_at': None}
1.4.0
GHSA-gj4p-3wh3-2rmf
2023-07-05T17:53:08Z
2017-12-21T00:47:25Z
null
['CVE-2017-17042']
Arbitrary file read vulnerability in yard server
`lib/yard/core_ext/file.rb` in the server in YARD before 0.9.11 does not block relative paths with an initial `../` sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042'}, {'type': 'WEB', 'url': 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/lsegal/yard'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2017-17042.yml'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:31Z', 'nvd_published_at': None}
1.4.0
GHSA-vx5c-87qx-cv6c
2021-06-10T20:06:12Z
2017-12-18T22:27:45Z
null
['CVE-2017-1001002']
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. ## Recommendation Update to version 3.17.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/552'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:44Z', 'nvd_published_at': None}
1.4.0
GHSA-pv8x-p9hq-j328
2023-09-12T18:41:33Z
2017-12-18T22:27:53Z
null
['CVE-2017-1001003']
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object. ## Recommendation Upgrade to version 3.17.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv8x-p9hq-j328'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/551'}]
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:06Z', 'nvd_published_at': None}
1.4.0
GHSA-3rpr-mg43-xhq4
2023-09-13T22:14:09Z
2017-12-21T00:47:20Z
null
['CVE-2017-17068']
auth0-js Privilege Escalation Vulnerability
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions &lt; 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with `auth0.popup.callback()`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-17068'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rpr-mg43-xhq4'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:17Z', 'nvd_published_at': '2017-12-06T19:29:00Z'}
1.4.0
GHSA-7fpw-cfc4-3p2c
2023-06-21T22:00:08Z
2017-12-28T22:51:45Z
2023-06-21T22:00:08Z
[]
Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of GHSA-77fw-rf4v-vfp9. This link is maintained to preserve external references. ## Original Description A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16897'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-16897'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}]
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:38Z', 'nvd_published_at': None}
1.4.0
GHSA-h9mj-fghc-664w
2021-09-14T17:16:40Z
2017-12-28T22:51:58Z
null
['CVE-2017-10910']
Denial of Service in mqtt
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. ## Proof of Concept The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead. ``` var mqttp = require('mqtt-packet'); var packets = []; for(var i=0; i<=1000;i++){ packets.push( mqttp.generate({ cmd:'publish', topic:Buffer.from('hello'), payload:Buffer.from('world'), retain: false, dup: false, messageId: ++i, qos: 1 }) ) } ``` ## Recommendation Update to version 2.15.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mqtt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9mj-fghc-664w'}, {'type': 'PACKAGE', 'url': 'https://github.com/mqttjs/MQTT.js'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN45494523/index.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/555'}]
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:48Z', 'nvd_published_at': None}
1.4.0
GHSA-pm9p-9926-w68m
2021-09-16T18:15:09Z
2017-12-28T22:52:47Z
null
['CVE-2016-10703']
Denial of Service in ecstatic
`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory. [Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/) ``` A payload of 22kB caused a lag of 1 second, A payload of 35kB caused a lag of 3 seconds, A payload of 86kB caused the server to crash ``` ## Recommendation Update to version 2.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2016-4450'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pm9p-9926-w68m'}, {'type': 'PACKAGE', 'url': 'https://github.com/jfhbrook/node-ecstatic'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/553'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:34Z', 'nvd_published_at': '2017-12-14T19:29:00Z'}
1.4.0
GHSA-2w67-526p-gm73
2023-03-14T21:11:23Z
2017-12-06T16:41:25Z
null
['CVE-2017-1000248']
redis-store deserializes untrusted data
Redis-store prior to 1.4.0 allows unsafe objects to be loaded from redis
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'redis-store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000248'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/ce13252c26fcc40ed4935c9abfeb0ee0761e5704'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis-store/redis-store'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/redis-store/CVE-2017-1000248.yml'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:06Z', 'nvd_published_at': None}
1.4.0
GHSA-8c56-cpmw-89x7
2021-06-30T18:05:23Z
2017-12-13T21:38:24Z
null
['CVE-2017-9050']
Out-of-bounds read in nokogiri
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses libxml2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-01'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3952'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:13Z', 'nvd_published_at': '2017-05-18T06:29:00Z'}
1.4.0
GHSA-3f5c-4qxj-vmpf
2023-09-05T22:34:28Z
2017-12-05T02:04:14Z
null
['CVE-2017-16877']
Next.js Directory Traversal Vulnerability
Next.js before 2.4.1 has directory traversal under the `/_next` and `/static` request namespace, allowing attackers to obtain sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/2.4.1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:56Z', 'nvd_published_at': None}