schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 4
values | aliases
stringlengths 2
20
| summary
stringlengths 24
115
| details
stringlengths 47
1.85k
| severity
stringclasses 24
values | affected
stringlengths 90
2.44k
| references
stringlengths 161
4.51k
| database_specific
stringlengths 131
175
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-5v3f-73gv-x7x5 | 2023-08-28T10:13:34Z | 2017-11-15T20:41:14Z | null | ['CVE-2017-7475'] | cairo is vulnerable to denial of service due to a null pointer dereference | Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the `FT_Load_Glyph` and `FT_Render_Glyph` resulting in an application crash. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cairo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.4'}, {'fixed': '1.15.5'}]}], 'versions': ['1.15.4']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475'}, {'type': 'WEB', 'url': 'https://bugs.freedesktop.org/show_bug.cgi?id=100763'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcairo/rcairo'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cairo/CVE-2017-7475.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2017/q2/151'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:22Z', 'nvd_published_at': '2017-05-19T20:29:00Z'} |
1.4.0 | GHSA-653m-r33x-39ff | 2023-03-14T23:07:43Z | 2017-11-29T23:20:14Z | null | ['CVE-2017-16792'] | Geminabox contains Cross-site Scripting | Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/geminabox/versions/0.13.10'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwh7-4jw9-33x6 | 2023-08-29T16:04:20Z | 2017-11-28T22:44:42Z | null | ['CVE-2017-16516'] | yajl-ruby gem Denial of Service vulnerability | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to `Yajl::Parser.new.parse`, the whole ruby process crashes with a SIGABRT in the `yajl_string_decode` function in `yajl_encode.c`. This results in the whole ruby process terminating and potentially a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'yajl-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2158'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianmario/yajl-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yajl-ruby/CVE-2017-16516.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00003.html'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/yajl-ruby'}] | {'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7cv6-gvx3-m54m | 2021-06-11T13:54:39Z | 2017-11-16T01:47:02Z | null | ['CVE-2017-15881'] | Cross-Site Scripting in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account.
## Recommendation
Update to version 4.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/981'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101541'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q97v-764g-r2rp | 2023-01-23T21:34:16Z | 2017-11-16T01:47:37Z | null | ['CVE-2014-9489'] | gollum and gollum-lib allow remote authenticated users to execute arbitrary code | The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string `master` is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the `-O` or `--open-files-in-pager` flags. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'gollum-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/913'}, {'type': 'WEB', 'url': 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/gollum'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229041306/http://www.securityfocus.com/bid/71499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/03/19'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3w5v-p54c-f74x | 2023-09-08T20:54:25Z | 2017-11-30T23:15:19Z | null | ['CVE-2017-1000228'] | ejs is vulnerable to remote code execution due to weak input validation | nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in `ejs.renderFile()` function | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.5.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w5v-p54c-f74x'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ejs:20161128'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041219/http://www.securityfocus.com/bid/101897'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wmjf-jpjj-9f3j | 2023-08-28T13:43:41Z | 2017-11-15T20:39:47Z | null | ['CVE-2017-8418'] | RuboCop gem Insecure use of /tmp | RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubocop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.49.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'}, {'type': 'WEB', 'url': 'https://github.com/bbatsov/rubocop/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/rubocop/rubocop/commit/dcb258fabd5f2624c1ea0e1634763094590c09d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbatsov/rubocop'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubocop/CVE-2017-8418.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/01/14'}] | {'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3v3c-r5v2-68ph | 2023-01-20T22:07:25Z | 2017-11-30T23:14:55Z | null | ['CVE-2017-0909'] | private_address_check contains Incomplete List of Disallowed Inputs | The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}, {'type': 'PACKAGE', 'url': 'https://github.com/jtdowney/private_address_check'}] | {'cwe_ids': ['CWE-184'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mw35-24gh-f82w | 2023-09-08T19:56:20Z | 2017-11-15T20:41:51Z | null | ['CVE-2017-7474'] | keycloak-connect and keycloak-js improperly handle invalid tokens | It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'keycloak-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-1203.html'}] | {'cwe_ids': ['CWE-253'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6494-v9fq-fgq2 | 2022-04-25T22:05:05Z | 2017-11-16T01:46:50Z | null | ['CVE-2017-15879'] | Keystone is vulnerable to CSV injection | CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6494-v9fq-fgq2'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43053/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x27v-x225-gq8g | 2023-08-29T15:38:45Z | 2017-12-06T16:43:00Z | null | ['CVE-2017-0905'] | Recurly gem Server-Side Request Forgery in Resource#find method | The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource#find` method that could result in compromise of API keys or other critical resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'PACKAGE', 'url': 'https://github.com/recurly/recurly-client-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/recurly/CVE-2017-0905.yml'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gj4p-3wh3-2rmf | 2023-07-05T17:53:08Z | 2017-12-21T00:47:25Z | null | ['CVE-2017-17042'] | Arbitrary file read vulnerability in yard server | `lib/yard/core_ext/file.rb` in the server in YARD before 0.9.11 does not block relative paths with an initial `../` sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042'}, {'type': 'WEB', 'url': 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/lsegal/yard'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2017-17042.yml'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vx5c-87qx-cv6c | 2021-06-10T20:06:12Z | 2017-12-18T22:27:45Z | null | ['CVE-2017-1001002'] | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
## Recommendation
Update to version 3.17.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/552'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv8x-p9hq-j328 | 2023-09-12T18:41:33Z | 2017-12-18T22:27:53Z | null | ['CVE-2017-1001003'] | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object.
## Recommendation
Upgrade to version 3.17.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv8x-p9hq-j328'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/551'}] | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3rpr-mg43-xhq4 | 2023-09-13T22:14:09Z | 2017-12-21T00:47:20Z | null | ['CVE-2017-17068'] | auth0-js Privilege Escalation Vulnerability | A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with `auth0.popup.callback()`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-17068'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rpr-mg43-xhq4'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:17Z', 'nvd_published_at': '2017-12-06T19:29:00Z'} |
1.4.0 | GHSA-7fpw-cfc4-3p2c | 2023-06-21T22:00:08Z | 2017-12-28T22:51:45Z | 2023-06-21T22:00:08Z | [] | Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2 | ## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of GHSA-77fw-rf4v-vfp9. This link is maintained to preserve external references.
## Original Description
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16897'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-16897'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}] | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h9mj-fghc-664w | 2021-09-14T17:16:40Z | 2017-12-28T22:51:58Z | null | ['CVE-2017-10910'] | Denial of Service in mqtt | Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
## Proof of Concept
The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead.
```
var mqttp = require('mqtt-packet');
var packets = [];
for(var i=0; i<=1000;i++){
packets.push(
mqttp.generate({
cmd:'publish',
topic:Buffer.from('hello'),
payload:Buffer.from('world'),
retain: false,
dup: false,
messageId: ++i,
qos: 1
})
)
}
```
## Recommendation
Update to version 2.15.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mqtt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9mj-fghc-664w'}, {'type': 'PACKAGE', 'url': 'https://github.com/mqttjs/MQTT.js'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN45494523/index.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/555'}] | {'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pm9p-9926-w68m | 2021-09-16T18:15:09Z | 2017-12-28T22:52:47Z | null | ['CVE-2016-10703'] | Denial of Service in ecstatic | `ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory.
[Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/)
```
A payload of 22kB caused a lag of 1 second,
A payload of 35kB caused a lag of 3 seconds,
A payload of 86kB caused the server to crash
```
## Recommendation
Update to version 2.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2016-4450'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pm9p-9926-w68m'}, {'type': 'PACKAGE', 'url': 'https://github.com/jfhbrook/node-ecstatic'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/553'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:34Z', 'nvd_published_at': '2017-12-14T19:29:00Z'} |
1.4.0 | GHSA-2w67-526p-gm73 | 2023-03-14T21:11:23Z | 2017-12-06T16:41:25Z | null | ['CVE-2017-1000248'] | redis-store deserializes untrusted data | Redis-store prior to 1.4.0 allows unsafe objects to be loaded from redis | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'redis-store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000248'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/ce13252c26fcc40ed4935c9abfeb0ee0761e5704'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis-store/redis-store'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/redis-store/CVE-2017-1000248.yml'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8c56-cpmw-89x7 | 2021-06-30T18:05:23Z | 2017-12-13T21:38:24Z | null | ['CVE-2017-9050'] | Out-of-bounds read in nokogiri | libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses libxml2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-01'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3952'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:13Z', 'nvd_published_at': '2017-05-18T06:29:00Z'} |
1.4.0 | GHSA-3f5c-4qxj-vmpf | 2023-09-05T22:34:28Z | 2017-12-05T02:04:14Z | null | ['CVE-2017-16877'] | Next.js Directory Traversal Vulnerability | Next.js before 2.4.1 has directory traversal under the `/_next` and `/static` request namespace, allowing attackers to obtain sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/2.4.1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:56Z', 'nvd_published_at': None} |