ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
PyPI
PYSEC-2021-277
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a read from outside of bounds of heap allocated data by sending invalid arguments to `tf.raw_ops.ResourceScatterUpdate`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b...
{'GHSA-7fvx-3jfc-2cpc', 'CVE-2021-37655'}
2021-08-27T03:22:44.439225Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc'}
null
{'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f'}
{'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f'}
PyPI
PYSEC-2021-627
null
TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `AllToAll` can be made to execute a division by 0. This occurs whenever the `split_count` argument is 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, Te...
{'CVE-2021-41218', 'GHSA-9crf-c6qr-r273'}
2021-12-09T06:35:10.125473Z
2021-11-05T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
null
{'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
{'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
PyPI
GHSA-x4qx-4fjv-hmw6
Integer overflow leading to crash in Tensorflow
### Impact The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation: ```pyth...
{'CVE-2022-21738'}
2022-03-03T05:13:56.550338Z
2022-02-09T23:45:09Z
MODERATE
null
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21738', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a', 'https://github.com/tensorflow/tensorflow/blob/5...
null
{'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'}
{'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'}
PyPI
PYSEC-2021-559
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. The [implementation](https...
{'CVE-2021-37646', 'GHSA-h6jh-7gv5-28vg'}
2021-12-09T06:35:02.920127Z
2021-08-12T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg'}
null
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'}
{'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5'}
PyPI
GHSA-g4rf-pc26-6hmr
OMERO webclient does not validate URL redirects on login or switching group.
### Background OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the ``omero.web.r...
{'CVE-2021-21377'}
2022-03-03T05:13:57.027034Z
2021-03-23T15:26:49Z
MODERATE
null
{'CWE-601'}
{'https://www.openmicroscopy.org/security/advisories/2021-SV2/', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr', 'https://github.com/ome/omero-web/blob/master/CHANGELOG....
null
{'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}
{'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}
PyPI
PYSEC-2022-100
null
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in ...
{'CVE-2022-23591', 'GHSA-247x-2f9f-5wp7'}
2022-03-09T00:17:36.268189Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7'}
null
{'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
{'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
PyPI
GHSA-74xw-82v7-hmrm
Improper Input Validation in python-dbusmock
python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spawn_server_template() method could be tricked into executing malicious code if an attacker supplies a .pyc file.
{'CVE-2015-1326'}
2022-03-03T05:13:12.559537Z
2019-04-23T16:04:36Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-1326', 'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'}
null
{'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'}
{'https://github.com/martinpitt/python-dbusmock/commit/4e7d0df9093'}
PyPI
GHSA-h2g5-2rhx-ffgj
Command injection in Weblate
Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affecte...
{'CVE-2022-24727'}
2022-03-14T23:16:46.391080Z
2022-03-05T00:00:44Z
HIGH
null
{'CWE-77'}
{'https://github.com/WeblateOrg/weblate', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj', 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040...
null
{'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842'}
{'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8', 'https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842'}
PyPI
PYSEC-2021-735
null
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blo...
{'GHSA-cjc7-49v2-jp64', 'CVE-2021-29609'}
2021-12-09T06:35:33.559422Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'}
null
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}
PyPI
PYSEC-2021-670
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/ker...
{'CVE-2021-29544', 'GHSA-6g85-3hm8-83f9'}
2021-12-09T06:35:22.335925Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
null
{'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
{'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
PyPI
GHSA-gpvv-69j7-gwj8
Path Traversal in pip
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py. A fix was committe...
{'CVE-2019-20916'}
2022-04-21T15:46:57.757453Z
2021-06-09T17:35:04Z
HIGH
null
{'CWE-22'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html', 'https://github.com/pypa/pip/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00010.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html', 'ht...
null
{'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'}
{'https://github.com/gzpan123/pip/commit/a4c735b14a62f9cb864533808ac63936704f2ace'}
PyPI
PYSEC-2021-220
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow. If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers. The implementation(https://github.com/tensorf...
{'GHSA-9xh4-23q4-v6wr', 'CVE-2021-29583'}
2021-08-27T03:22:36.144215Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr', 'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'}
null
{'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'}
{'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'}
RubyGems
GHSA-46f2-3v63-3xrp
Path traversal in Tempfile on Windows
There is an unintentional directory creation vulnerability in `tmpdir` library bundled with Ruby on Windows. And there is also an unintentional file creation vulnerability in tempfile library bundled with Ruby on Windows, because it uses tmpdir internally.
{'CVE-2021-28966'}
2022-03-03T05:13:55.780986Z
2021-05-06T15:01:36Z
MODERATE
null
{'CWE-22'}
{'https://hackerone.com/reports/1131465', 'https://security.netapp.com/advisory/ntap-20210902-0004/', 'https://www.ruby-lang.org/en/news/2021/04/05/tempfile-path-traversal-on-windows-cve-2021-28966/', 'https://github.com/ruby/tmpdir', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28966', 'https://github.com/ruby/tmpdir/pu...
null
{'https://github.com/ruby/tmpdir/commit/93798c01cb7c10476e50a4d80130a329ba47f348'}
{'https://github.com/ruby/tmpdir/commit/93798c01cb7c10476e50a4d80130a329ba47f348'}
RubyGems
GHSA-2w67-526p-gm73
redis-store deserializes untrusted data the affected version range and description should be adjust to match as well
Redis-store <=v1.3.0 allows unsafe objects to be loaded from redis
{'CVE-2017-1000248'}
2022-04-25T22:16:55.481411Z
2017-12-06T16:41:25Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000248', 'https://github.com/redis-store/redis-store', 'https://github.com/advisories/GHSA-2w67-526p-gm73'}
null
{'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}
{'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}
RubyGems
GHSA-vxf6-w9mp-95hm
Low severity vulnerability that affects puppet
lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address.
{'CVE-2012-3408'}
2022-03-03T05:14:03.717923Z
2017-10-24T18:33:38Z
LOW
null
{'CWE-287'}
{'http://puppetlabs.com/security/cve/cve-2012-3408/', 'https://github.com/puppetlabs/puppet', 'https://github.com/advisories/GHSA-vxf6-w9mp-95hm', 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408', 'https://bugzilla.redhat.com/show_b...
null
{'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}
{'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}
RubyGems
GHSA-qh4w-7pw3-p4rp
Potential denial of service in bson rubygem
The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410.
{'CVE-2015-4411'}
2022-03-03T05:13:31.309816Z
2020-04-29T15:34:50Z
HIGH
null
{'CWE-400'}
{'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4411', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html', 'https://www.securityfocus.com/bid/75045', 'https://sa...
null
{'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe...
{'https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb548ccb5a6d6ac4bfee5R191', 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe...
RubyGems
GHSA-g6wq-qcwm-j5g2
Regular Expression Denial of Service in websocket-extensions (RubyGem)
### Impact The ReDoS flaw allows an attacker to exhaust the server's capacity to process incoming requests by sending a WebSocket handshake request containing a header of the following form: Sec-WebSocket-Extensions: a; b="\c\c\c\c\c\c\c\c\c\c ... That is, a header containing an unclosed string parameter value w...
{'CVE-2020-7663'}
2022-03-03T05:13:04.470258Z
2020-06-05T14:21:29Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830', 'https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2', 'https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7663', 'https://usn.ubuntu.com/4502-1/'...
null
{'https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b'}
{'https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b'}
RubyGems
GHSA-qrqm-fpv6-6r8g
Command Injection Vulnerability in Mechanize
This security advisory has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA). ### Impact Mechanize `>= v2.0`, `< v2.7.7` allows for OS commands to be injected using several classes' methods which implicitly use Ruby's `Kernel.open`...
{'CVE-2021-21289'}
2022-04-27T20:31:57.937283Z
2021-02-02T18:50:27Z
HIGH
null
{'CWE-78'}
{'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0', 'https://security.gentoo.org/glsa/202107-17', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNFZ7ROYS6V4J5L5PRAJUG2AWC7VXR2V/', 'https://lists.debian.org/debian-lts-announce/2...
null
{'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0'}
{'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0'}
RubyGems
GHSA-52p9-v744-mwjj
Remote code execution in Kramdown
Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.
{'CVE-2021-28834'}
2022-03-03T05:13:10.234883Z
2021-03-29T16:30:34Z
HIGH
null
{'CWE-94'}
{'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://lists.fedoraproj...
null
{'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66', 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760'}
{'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2'}
RubyGems
GHSA-rp63-jfmw-532w
High severity vulnerability that affects mail
The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
{'CVE-2012-2140'}
2022-03-03T05:13:28.878669Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-20'}
{'http://secunia.com/advisories/48970', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'https://github.com/mikel/mail/blob/...
null
{'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'}
{'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'}
RubyGems
GHSA-f2rp-4rv7-fc95
Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox
A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmo...
{'CVE-2021-20259'}
2022-03-03T05:12:50.674375Z
2021-06-10T15:54:43Z
HIGH
null
{'CWE-200'}
{'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1932144', 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20259'}
null
{'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'}
{'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'}
RubyGems
GHSA-c92m-rrrc-q5wf
High severity vulnerability that affects safemode
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
{'CVE-2016-3693'}
2022-03-03T05:14:04.550026Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-200'}
{'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f', 'http://projects.theforeman.org/issues/14635', 'http://www.openwall.com/lists/oss-security/2016/04/20/8', 'http://theforeman.org/security.htm...
null
{'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f', 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'}
{'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'}
RubyGems
GHSA-hxhj-hp9m-qwc4
Moderate severity vulnerability that affects private_address_check
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.
{'CVE-2017-0904'}
2022-03-03T05:14:08.022941Z
2017-11-29T23:21:05Z
MODERATE
null
{'CWE-242'}
{'https://edoverflow.com/2017/ruby-resolv-bug/', 'https://github.com/advisories/GHSA-hxhj-hp9m-qwc4', 'https://github.com/jtdowney/private_address_check/issues/1', 'https://hackerone.com/reports/287835', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904', 'https://hackerone.com/reports/287245', 'https://github.com/jtdown...
null
{'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}
{'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}
RubyGems
GHSA-q86f-fmqf-qrf6
Moderate severity vulnerability that affects mail
The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
{'CVE-2015-9097'}
2022-03-03T05:13:34.066169Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-93'}
{'https://rubysec.com/advisories/mail-OSVDB-131677', 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83', 'http://www.mbsd.jp/Whitepaper/smtpi.pdf', 'https://github.com/mikel/mail/pull/1097', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097', 'https://github.com/rubysec/ruby-advisory-db', 'ht...
null
{'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83'}
{'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83'}
RubyGems
GHSA-h3fg-h5v3-vf8m
CSRF forgery protection bypass in solidus_frontend
### Impact CSRF vulnerability that allows a malicious site to add an item to the user's cart without their knowledge. All `solidus_frontend` versions are affected. If you're using your own storefront, please, follow along to make sure you're not affected. To reproduce the issue: - Pick the id for a variant with avai...
{'CVE-2021-43846'}
2022-03-03T05:13:47.735941Z
2022-01-06T18:33:44Z
MODERATE
null
{'CWE-352'}
{'https://github.com/solidusio/solidus/security/advisories/GHSA-h3fg-h5v3-vf8m', 'https://github.com/solidusio/solidus/commit/a1b9bf7f24f9b8684fc4d943eacb02b1926c77c6', 'https://github.com/solidusio/solidus/commit/4d17cacf066d9492fc04eb3a0b16084b47376d81', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43846', 'https://git...
null
{'https://github.com/solidusio/solidus/commit/a1b9bf7f24f9b8684fc4d943eacb02b1926c77c6', 'https://github.com/solidusio/solidus/commit/4d17cacf066d9492fc04eb3a0b16084b47376d81'}
{'https://github.com/solidusio/solidus/commit/a1b9bf7f24f9b8684fc4d943eacb02b1926c77c6', 'https://github.com/solidusio/solidus/commit/4d17cacf066d9492fc04eb3a0b16084b47376d81'}
RubyGems
GHSA-fmx4-26r3-wxpf
Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
### Impact CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker ro...
null
2022-03-07T20:47:53.775868Z
2022-03-03T20:28:47Z
HIGH
null
{'CWE-190'}
{'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf', 'https://github.com/gjtorikian/commonmarker', 'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3', 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x'}
null
{'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3'}
{'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3'}
RubyGems
GHSA-cj92-c4fj-w9c5
Moderate severity vulnerability that affects mail
Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter.
{'CVE-2012-2139'}
2022-03-03T05:14:05.088425Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-22'}
{'http://secunia.com/advisories/48970', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139', 'https://github.com/advisories/GHSA-cj92-c4fj-w9c5', 'http://lists...
null
{'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f'}
{'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f'}
RubyGems
GHSA-px3r-jm9g-c8w8
Moderate severity vulnerability that affects rails-html-sanitizer
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar ...
{'CVE-2018-3741'}
2022-03-03T05:14:12.117468Z
2018-04-26T15:41:10Z
MODERATE
null
{'CWE-79'}
{'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3741', 'https://github.com/advisories/GHSA-px3r-jm9g-c8w8'}
null
{'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'}
{'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'}
RubyGems
GHSA-crjr-9rc5-ghw8
Inefficient Regular Expression Complexity in Nokogiri
## Summary Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1...
{'CVE-2022-24836'}
2022-04-26T18:17:12.810194Z
2022-04-11T21:18:06Z
HIGH
null
{'CWE-1333', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24836', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists....
null
{'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}
{'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}
RubyGems
GHSA-5f9h-9pjv-v6j7
Directory traversal in Rack::Directory app bundled with Rack
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
{'CVE-2020-8161'}
2022-03-03T05:13:05.884012Z
2020-07-06T21:31:02Z
MODERATE
null
{'CWE-548'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8161', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e', 'https://usn.ubuntu.com/4561-1/', 'https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA', 'https://hackerone....
null
{'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}
{'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}
RubyGems
GHSA-pcqq-5962-hvcw
Denial of Service in uap-core when processing crafted User-Agent strings
### Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ### Patches Please update `uap-ruby` to &gt;= v2.6.0 #...
null
2022-03-03T05:14:03.085188Z
2020-03-10T18:02:49Z
HIGH
null
null
{'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a', 'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw'}
null
{'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}
{'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}
RubyGems
GHSA-g98m-96g9-wfjq
Insecure path handling in Bundler
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in th...
{'CVE-2019-3881'}
2022-03-03T05:12:42.465042Z
2021-05-10T14:53:59Z
HIGH
null
{'CWE-427', 'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3881', 'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998', 'https://github.com/rubygems/bundler', 'https://bugzilla.redhat.com/show_bug.cgi?id=1651826', 'https://github.com/rubygems/bundler/issues/6501'}
null
{'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'}
{'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998'}
RubyGems
GHSA-q44r-f2hm-v76v
Moderate severity vulnerability that affects puppet
lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into si...
{'CVE-2012-3867'}
2022-03-03T05:13:36.382813Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=839158', 'http://www.debian.org/security/2012/dsa-2511', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867', 'https://github.com/advisories/GHSA-q44r-f2hm-v76v', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://puppetlabs.com/security/cve/cve-2012-3867/', 'http://lists.opensus...
null
{'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}
{'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}
RubyGems
GHSA-h77x-m5q8-c29h
Moderate severity vulnerability that affects rack
lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
{'CVE-2012-6109'}
2022-03-03T05:13:12.747609Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-835'}
{'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'https://github.com/rack/rack/', 'https://bugzilla.redhat.com/show_bug.cgi?id=895277', 'http://rack.github.com/', 'https://github.com/r...
null
{'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}
{'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}
RubyGems
GHSA-653m-r33x-39ff
Moderate severity vulnerability that affects geminabox
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
{'CVE-2017-16792'}
2022-03-03T05:13:16.322021Z
2017-11-29T23:20:14Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://rubygems.org/gems/geminabox/versions/0.13.10', 'h...
null
{'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}
{'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}
RubyGems
GHSA-qxmr-qxh6-2cc9
ReDos vulnerability on guest checkout email validation
### Impact Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`. Before the patch, it can be reproduced in the console like this: ```ruby irb(main)> Spree::E...
{'CVE-2021-43805'}
2022-03-03T05:13:22.044529Z
2021-12-07T22:01:47Z
HIGH
null
{'CWE-1333'}
{'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9', 'https://git...
null
{'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}
{'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}
RubyGems
GHSA-x27v-x225-gq8g
Server-Side Request Forgery in Recurly
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
{'CVE-2017-0905'}
2022-03-03T05:13:53.022542Z
2017-12-06T16:43:00Z
CRITICAL
null
{'CWE-918'}
{'https://dev.recurly.com/page/ruby-updates', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://hackerone.com/reports/288635', 'https://github.com/recurly/recurly-client-ruby', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://github.com/advisories/GHSA-...
null
{'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}
{'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}
RubyGems
GHSA-49pj-69vf-c689
Incorrect Default Permissions in netaddr
The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
{'CVE-2019-17383'}
2022-03-03T05:14:12.069946Z
2019-10-14T21:43:19Z
CRITICAL
null
{'CWE-276'}
{'https://rubygems.org/gems/netaddr/versions', 'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17383'}
null
{'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'}
{'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'}
RubyGems
GHSA-2j9c-9vmv-7m39
Missing anchor in Rack-Cors allows malicious third party site to perform CORS request
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net)...
{'CVE-2017-11173'}
2022-04-26T18:33:06.302051Z
2018-07-31T18:18:39Z
HIGH
null
null
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'http://www.debian.org/security/2017/dsa-3931', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html', 'https...
null
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}
RubyGems
GHSA-rg32-m3hf-772v
Deserialization of Untrusted Data in Slanger
Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0...
{'CVE-2019-1010306'}
2022-03-03T05:13:31.232916Z
2019-07-16T00:41:40Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'}
null
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'}
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'}
RubyGems
GHSA-pf8f-w267-mq2h
The rack-cors rubygem may allow directory traveral
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
{'CVE-2019-18978'}
2022-03-03T05:14:17.661216Z
2019-11-15T20:26:59Z
MODERATE
null
{'CWE-22'}
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://www.debian.org/security/2021/dsa-4918', 'https://usn.ubuntu.com/4571-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html', 'https://lists.debian.org/debia...
null
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}
RubyGems
GHSA-4p8f-mmfj-r45g
Cross-site scripting in fat_free_crm
Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb.
{'CVE-2018-20975'}
2022-03-03T05:12:18.531927Z
2019-08-21T16:15:04Z
MODERATE
null
{'CWE-79'}
{'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'}
null
{'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}
{'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}
RubyGems
GHSA-48w2-rm65-62xx
Inconsistent Interpretation of HTTP Requests in puma
### Impact Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. This behavior (forwarding LF characters as line en...
{'CVE-2021-41136'}
2022-03-03T05:13:42.190337Z
2021-10-12T17:53:00Z
LOW
null
{'CWE-444'}
{'https://github.com/puma/puma/releases/tag/v5.5.1', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://github.com/puma/puma', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09...
null
{'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}
{'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}
RubyGems
GHSA-2hxv-mx8x-mcj9
Spina vulnerable to a cross-site request forgery (CSRF) vulnerability
Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75.
{'CVE-2015-4619'}
2022-04-26T18:33:06.216082Z
2018-08-28T22:34:22Z
HIGH
null
{'CWE-352'}
{'http://www.securityfocus.com/bid/75216', 'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'https://github.com/denkGroot/Spina', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c49...
null
{'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}
{'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}
RubyGems
GHSA-46j2-xjgp-jrfm
Information disclosure issue in Active Resource
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
{'CVE-2020-8151'}
2022-03-03T05:13:44.971445Z
2020-05-21T21:09:38Z
HIGH
null
{'CWE-863', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8151', 'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4...
null
{'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'}
{'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'}
RubyGems
GHSA-wjx2-7hqq-8h7m
rails_admin ruby gem XSS vulnerability
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
{'CVE-2020-36190'}
2022-03-03T05:12:39.003321Z
2021-01-14T19:17:16Z
MODERATE
null
{'CWE-79'}
{'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://github.com/s...
null
{'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'}
{'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'}
RubyGems
GHSA-jc8m-cxhj-668x
Improper Restriction of Excessive Authentication Attempts in Sorcery
### Impact Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users ...
{'CVE-2020-11052'}
2022-03-03T05:13:08.974248Z
2020-05-07T21:16:46Z
HIGH
null
{'CWE-307'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/issues/231', 'https://github.com/Sorcery/sorcery/pull/235', 'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x'}
null
{'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'}
{'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'}
RubyGems
GHSA-mqm2-cgpr-p4m6
Unintended read access in kramdown gem
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLa...
{'CVE-2020-14001'}
2022-04-29T20:33:22.978732Z
2020-08-07T22:27:41Z
CRITICAL
null
{'CWE-862'}
{'https://kramdown.gettalong.org/news.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://www.debian.org/security/2020/dsa-4743', 'https://security.netapp.com/advisory/ntap-20200731-0004/', 'https://usn.ubuntu.com/4562-1/', ...
null
{'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}
{'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}
RubyGems
GHSA-6h88-qjpv-p32m
OpenSSL gem for Ruby using inadequate encryption strength
The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
{'CVE-2016-7798'}
2022-04-25T16:47:00.898499Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-326'}
{'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'https://www.debian.org/security/2017/dsa-3966', 'http://www.openwall.com/lists/oss-security/2016/10/01/2', 'https://github.com/ruby/openssl', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'https://github.com/ruby/openssl/issues/49', 'https:/...
null
{'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}
{'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}
RubyGems
GHSA-w749-p3v6-hccq
Possible code injection vulnerability in Rails / Active Storage
The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally...
{'CVE-2022-21831'}
2022-03-11T20:46:53.775228Z
2022-03-08T21:25:54Z
HIGH
null
{'CWE-94'}
{'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://github.com/rails/rails', 'https://rubysec.com/advisories/CVE-2022-21831/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI'}
null
{'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}
{'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}
RubyGems
GHSA-h6rj-8r3c-9gpj
bson is vulnerable to denial of service due to incorrect regex validation
BSON injection vulnerability in the legal function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
{'CVE-2015-4412'}
2022-04-25T22:45:10.830Z
2018-03-05T19:43:21Z
CRITICAL
null
{'CWE-400'}
{'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://www.securityf...
null
{'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}
{'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}
RubyGems
GHSA-h8hx-2c5r-32cf
Cross-Site Request Forgery (CSRF) in trestle-auth
### Impact A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. ### Pa...
{'CVE-2021-29435'}
2022-03-03T05:14:00.718340Z
2021-04-13T17:01:50Z
HIGH
null
{'CWE-352'}
{'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://rubygems.org/gems/trestle-auth', 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}
null
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}
RubyGems
GHSA-w542-cpp9-r3g7
CSRF in Field Test
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2. ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication me...
{'CVE-2020-16252'}
2022-03-03T05:14:05.267374Z
2020-08-05T14:53:34Z
MODERATE
null
{'CWE-352'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252', 'https://github.com/ankane/field_test/issues/28', 'https://github.com/ankane/field_test', 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d...
null
{'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}
{'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}
RubyGems
GHSA-fj7f-vq84-fh43
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.
In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with inva...
{'CVE-2021-43809'}
2022-03-03T05:13:05.052325Z
2021-12-08T19:51:36Z
MODERATE
null
{'CWE-88'}
{'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809', 'https://github.com/rubygems/rubygems/pull/5142', 'https://github.com/rubygems/rubygems/commit/a4f2f...
null
{'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}
{'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f'}
RubyGems
GHSA-3pxh-h8hw-mj8w
Moderate severity vulnerability that affects rack
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
{'CVE-2013-0183'}
2022-03-03T05:12:52.510484Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-119'}
{'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d...
null
{'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'}
{'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'}
RubyGems
GHSA-cm9w-c4rj-r2cf
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component
This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.29.1 and 2.49.1 have been released and fully mitigate ...
{'CVE-2022-24722'}
2022-03-11T20:16:47.644105Z
2022-03-02T22:24:05Z
HIGH
null
{'CWE-79'}
{'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_component/releases/tag/v2.31.2', 'https://github.com/github/...
null
{'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'}
{'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'}
RubyGems
GHSA-7359-3c6r-hfc2
Improper Certificate Validation in oauth ruby gem
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
{'CVE-2016-11086'}
2022-03-03T05:14:19.515545Z
2021-04-22T16:22:15Z
HIGH
null
{'CWE-295'}
{'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://github.com/oauth-xx/oauth-ruby', 'https://github.com/oauth-xx/oauth-ruby/releases...
null
{'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}
{'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}
RubyGems
GHSA-2p5p-m353-833w
Sort order SQL injection in Administrate
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. W...
{'CVE-2020-5257'}
2022-03-03T05:13:51.867939Z
2020-03-13T21:05:44Z
HIGH
null
{'CWE-943'}
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'}
null
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'}
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'}
RubyGems
GHSA-f93j-hmcr-jcwh
Data Injection Vulnerability in moped Rubygem
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
{'CVE-2015-4410'}
2022-03-03T05:13:23.301091Z
2020-08-19T16:45:49Z
HIGH
null
{'CWE-20'}
{'https://github.com/mongoid/moped/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml', 'https://rubygems.org/gems/moped/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410', 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://lists.fedoraproject.org/piperm...
null
{'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}
{'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}
RubyGems
GHSA-r9c2-cr39-c8g6
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
{'CVE-2015-7579'}
2022-03-03T05:14:07.427612Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/12', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579',...
null
{'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}
{'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}
RubyGems
GHSA-jg4m-q6w8-vrjp
High severity vulnerability that affects rgpg
The self.run_gpg function in lib/rgpg/gpg_helper.rb in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
{'CVE-2013-4203'}
2022-03-03T05:14:16.169786Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'https://github.com/rcook/rgpg', 'https://github.com/advisories/GHSA-jg4m-q6w8-vrjp', 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203', 'http://www.openwall.com/lists/oss-security/2013/08/03/2'}
null
{'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}
{'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}
RubyGems
GHSA-h5g2-38x9-4gv3
High severity vulnerability that affects archive-tar-minitar and minitar
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
{'CVE-2016-10173'}
2022-03-03T05:13:07.674662Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-22'}
{'https://security.gentoo.org/glsa/201702-32', 'https://github.com/advisories/GHSA-h5g2-38x9-4gv3', 'https://github.com/halostatue/minitar', 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4', 'https://puppet.com/security/cve/cve-2016-10173', 'http://www.securityfocus.com/bid/95874'...
null
{'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}
{'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}
RubyGems
GHSA-v222-6mr4-qj29
Command Injection vulnerability in asciidoctor-include-ext
### Impact Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on ...
{'CVE-2022-24803'}
2022-04-18T22:32:08.086487Z
2022-03-31T23:27:15Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803', 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7...
null
{'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee', 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155'}
{'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155', 'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee'}
RubyGems
GHSA-vvff-6wrr-4g7q
Missing Authentication for Critical Function in Foreman Ansible
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-3589'}
2022-04-05T19:31:57.898132Z
2022-03-24T00:00:17Z
CRITICAL
null
{'CWE-306'}
{'https://github.com/theforeman/foreman_ansible', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://access.redhat.com/security/cve/CVE-2021-3589'}
null
{'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'}
{'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'}
RubyGems
GHSA-85rf-xh54-whp3
Malicious URL drafting attack against iodines static file server may allow path traversal
### Impact A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version. Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't ...
null
2022-03-03T05:13:29.632570Z
2019-10-07T16:52:13Z
LOW
null
{'CWE-22'}
{'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/boazsegev/iodine'}
null
{'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'}
{'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'}
RubyGems
GHSA-65cv-r6x7-79hv
Possible XSS vulnerability in ActionView
There is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. ### Impact There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for esca...
{'CVE-2020-5267'}
2022-03-03T05:13:34.293247Z
2020-03-19T17:30:29Z
MODERATE
null
{'CWE-80'}
{'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv', 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html', 'http://www.openwall.com/lists/oss-...
null
{'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'}
{'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'}
RubyGems
GHSA-v2r9-c84j-v7xm
Moderate severity vulnerability that affects rdoc
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
{'CVE-2013-0256'}
2022-03-03T05:11:50.274049Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html', 'https://nvd.nist.gov/vuln/detail/CVE-...
null
{'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'}
{'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'}
RubyGems
GHSA-c5r5-7pfh-6qg6
OS command injection in BibTeX-Ruby
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
{'CVE-2019-10780'}
2022-03-03T05:13:15.649341Z
2020-02-14T23:10:01Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602', 'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10780'}
null
{'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}
{'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}
RubyGems
GHSA-qg54-694p-wgpp
Regular expression denial of service vulnerability (ReDoS) in date
Date’s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected. The fix limits the input length up to 128 bytes by default instead of changing the ...
{'CVE-2021-41817'}
2022-03-17T23:15:06.275918Z
2021-11-16T00:32:30Z
MODERATE
null
{'CWE-1333'}
{'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41817', 'https://hackerone.com/reports/1254844', 'https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/'}
null
{'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0'}
{'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0'}
RubyGems
GHSA-xm34-v85h-9pg2
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: - Executed whether as: - A `before_action` callback (the default) - A `prepend_before_action` (option `prep...
{'CVE-2021-41274'}
2022-03-03T05:13:04.888419Z
2021-11-18T20:09:32Z
CRITICAL
null
{'CWE-352'}
{'https://github.com/solidusio/solidus_auth_devise/releases/tag/v2.5.4', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/solidusio/solidus_auth_devise', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41274', 'https://github.com/solidusio/solidus_auth_devise/co...
null
{'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555'}
{'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555'}
RubyGems
GHSA-6c8p-qphv-668v
Moderate severity vulnerability that affects ruby-openid
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
{'CVE-2013-1812'}
2022-03-03T05:13:34.437438Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'https://github.com/openid/ruby-openid/pull/43', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812', 'https://github.com/advisories/GHSA-6c8p-qphv-668v', 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed', 'https://bugzilla.redhat.com/show_bug.cgi?id=918134', 'https://github.com/open...
null
{'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed'}
{'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed'}
RubyGems
GHSA-8cr8-4vfw-mr7h
Round-trip instability in REXML
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
{'CVE-2021-28965'}
2022-03-03T05:12:51.494816Z
2021-04-30T17:30:37Z
HIGH
null
{'CWE-115', 'CWE-611'}
{'https://security.netapp.com/advisory/ntap-20210528-0003/', 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/', 'https://github.com/ruby/...
null
{'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618', 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377', 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b', 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e7...
{'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752', 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b', 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618', 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73f...
RubyGems
GHSA-5jjv-x4fq-qjwp
Possible timing attack in derivation_endpoint
### Impact When using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. ### Patches The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivati...
{'CVE-2020-15237'}
2022-03-03T05:12:51.614261Z
2020-10-05T15:48:34Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15237', 'https://github.com/shrinerb/shrine/security/advisories/GHSA-5jjv-x4fq-qjwp', 'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0'}
null
{'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0'}
{'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0'}
RubyGems
GHSA-72rj-36qc-47g7
Information Disclosure
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
{'CVE-2021-31671'}
2022-03-03T05:13:35.722980Z
2021-04-27T15:54:52Z
HIGH
null
{'CWE-319'}
{'https://rubygems.org/gems/pgsync', 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26', 'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671', 'https://github.com/ankane/pgsync/issues/121'}
null
{'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}
{'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}
RubyGems
GHSA-33vf-4xgg-9r58
HTTP Response Splitting (Early Hints) in Puma
### Impact If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org...
{'CVE-2020-5249'}
2022-03-03T05:13:14.257648Z
2020-03-03T23:33:16Z
MODERATE
null
{'CWE-113'}
{'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://lists.fedoraproject.org/archive...
null
{'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3'}
{'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3'}
RubyGems
GHSA-p463-639r-q9g9
High severity vulnerability that affects dragonfly
The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.
{'CVE-2013-1756'}
2022-03-03T05:13:57.699140Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'http://secunia.com/advisories/52380', 'https://github.com/markevans/dragonfly', 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756', 'https://github.com/advisories/GHSA-...
null
{'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}
{'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}
RubyGems
GHSA-grh7-935j-hg6w
Cross-site Scripting in Sidekiq
Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.
{'CVE-2021-30151'}
2022-03-11T21:32:03.736743Z
2021-10-06T17:47:17Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mperham/sidekiq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/mperham/sidekiq/issues/4852', 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}
null
{'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}
{'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}
RubyGems
GHSA-fp4w-jxhp-m23p
Dependency Confusion in Bundler
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended...
{'CVE-2020-36327'}
2022-04-07T16:01:53.914898Z
2021-05-24T18:12:33Z
HIGH
null
null
{'https://github.com/rubygems/rubygems/blob/master/bundler/CHANGELOG.md#2218-may-25-2021', 'https://github.com/rubygems/rubygems/issues/3982', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2020-36327.yml', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105', 'https:/...
null
{'https://github.com/rubygems/rubygems/commit/078bf682ac40017b309b5fc69f283ff640e7c129'}
{'https://github.com/rubygems/rubygems/commit/078bf682ac40017b309b5fc69f283ff640e7c129'}
RubyGems
GHSA-gx8x-g87m-h5q6
Denial of Service (DoS) in Nokogiri on JRuby
## Summary Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity). See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekoh...
null
2022-04-11T21:46:13.507995Z
2022-04-11T21:38:11Z
HIGH
null
{'CWE-400'}
{'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d', 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=ema...
null
{'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}
{'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}
RubyGems
GHSA-rmj8-8hhh-gv5h
Information Exposure when using Puma with Rails
### Impact Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. From Rails: > Under certain circumstances response bodies will not b...
{'CVE-2022-23634'}
2022-03-03T05:14:18.447089Z
2022-02-11T21:33:23Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23634', 'https://github.com/puma/puma', 'https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h', 'https://github.com/advisories/GHSA-rmj8-8hhh-gv5h', 'https://github.com/advisories/GHSA-wh98-p28r-vrc9', 'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c...
null
{'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb'}
{'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb'}
RubyGems
GHSA-c9c5-9fpr-m882
Moderate severity vulnerability that affects sentry-raven
The numtok function in lib/raven/okjson.rb in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number.
{'CVE-2014-9490'}
2022-03-03T05:13:09.656620Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'http://seclists.org/oss-sec/2015/q1/26', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9490', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687', 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f', 'https://github.com/advisories/GHSA-c9c5-9fpr-m882', 'https://groups.googl...
null
{'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f'}
{'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f'}
RubyGems
GHSA-cfjv-5498-mph5
XSS in Action View
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. ### Impact When an HTML-unsafe string is passed as the default for a missing tr...
{'CVE-2020-15169'}
2022-03-03T05:13:09.709282Z
2020-09-11T15:19:57Z
MODERATE
null
{'CWE-79'}
{'https://github.com/rails/rails', 'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15169', 'https://github.com/rails/rails/s...
null
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}
RubyGems
GHSA-hrqr-hxpp-chr3
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully ...
{'CVE-2019-16782'}
2022-03-03T05:13:31.216463Z
2019-12-18T19:01:31Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'http://www.openwall.com/lists/oss-security/2019/12/18/3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782', 'https://github.com/rack/rack', 'http://www.openwall.com/lists/oss-security/2019/12/19/3', 'http://www.openwall.com/lists/oss-security/2020/04/09/2', 'http://www.openwall.com/lists/oss-security/2020/04/08/1', ...
null
{'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
{'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
RubyGems
GHSA-2rr5-8q37-2w7h
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
### Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.) ### Impact In Nokogiri v1.12.4 and...
{'CVE-2021-41098'}
2022-03-03T05:13:14.323333Z
2021-09-27T20:12:47Z
HIGH
null
{'CWE-611'}
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41098', 'https://github.com/sparklemotion/nokogiri'}
null
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}
RubyGems
GHSA-qw8w-2xcp-xg59
Low severity vulnerability that affects passenger
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
{'CVE-2014-1832'}
2021-09-16T21:10:02Z
2018-10-10T17:29:27Z
LOW
null
null
{'http://openwall.com/lists/oss-security/2014/01/29/6', 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://github.com/phusion/passenger', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832', 'http:...
null
{'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
{'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
RubyGems
GHSA-w978-rmpf-qmwg
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
### Impact If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new `Content-Security-Policy` header with the remaining value of the original string....
{'CVE-2020-5216'}
2022-03-03T05:13:23.477762Z
2020-01-23T02:27:53Z
MODERATE
null
{'CWE-113'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5216', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg', 'https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0'}
null
{'https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0'}
{'https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0'}
RubyGems
GHSA-j7vx-8mqj-cqp9
Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper
### Impact Information disclosure vulnerability. Allows an attacker to see all `Doorkeeper::Application` model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json). ### Patches These versions have the fix: * 5.0.3 * 5.1.1 * 5.2.5 * 5....
{'CVE-2020-10187'}
2022-03-03T05:13:28.486543Z
2020-05-07T21:11:07Z
HIGH
null
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10187', 'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6', 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9', 'https://github.com/doorkeeper-gem/doorkeeper/releases', 'https://github.com/rubysec...
null
{'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6'}
{'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6'}
RubyGems
GHSA-ch3h-j2vf-95pv
XSS Vulnerability in Action View tag helpers
There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777. Versions Affected: ALL Not affected: NONE Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7...
{'CVE-2022-27777'}
2022-04-27T23:16:59.052518Z
2022-04-27T22:32:49Z
HIGH
null
{'CWE-79'}
{'https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw', 'https://github.com/rails/rails', 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85', 'https://nvd.nist.gov/vuln/detail/CVE-2022...
null
{'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}
{'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}
RubyGems
GHSA-cvw2-xj8r-mjf7
Activerecord-session_store Timing Attack
The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a rel...
{'CVE-2019-25025'}
2022-03-03T05:12:44.882098Z
2021-03-09T00:45:31Z
MODERATE
null
{'CWE-208'}
{'https://rubygems.org/gems/activerecord-session_store', 'https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0', 'https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml', 'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0...
null
{'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160'}
{'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160'}
RubyGems
GHSA-pxqr-8v54-m2hj
Moderate severity vulnerability that affects rails_admin
rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.
{'CVE-2016-10522'}
2022-03-03T05:12:51.420754Z
2018-08-08T22:30:35Z
MODERATE
null
{'CWE-352'}
{'https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a', 'https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10522', 'https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/', 'https://...
null
{'https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a'}
{'https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a'}
RubyGems
GHSA-gj4p-3wh3-2rmf
High severity vulnerability that affects yard
lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
{'CVE-2017-17042'}
2022-03-03T05:13:44.937947Z
2017-12-21T00:47:25Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042', 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4', 'https://github.com/lsegal/yard'}
null
{'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}
{'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}
RubyGems
GHSA-h99w-9q5r-gjq9
HTTP Request Smuggling in puma
When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The following vulnerabilities are addressed ...
{'CVE-2022-24790'}
2022-04-12T16:46:52.055525Z
2022-03-30T21:48:50Z
CRITICAL
null
{'CWE-444'}
{'https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9', 'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5', 'https://github.com/puma/puma', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24790', 'https://portswigger.net/web-security/request-smuggling'}
null
{'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5'}
{'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5'}
RubyGems
GHSA-r5jw-62xg-j433
Cross-Site Scripting in Kaminari
### Impact In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1. ### Releases The 1.2.1 gem including the patch has already been released. All past released versions are affected by this vulnerability. #...
{'CVE-2020-11082'}
2022-03-03T05:13:55.329992Z
2020-05-28T21:10:11Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11082', 'https://github.com/github/advisory-review/pull/1020', 'https://github.com/kaminari/kaminari', 'https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433', 'https://www.debian.org/security/2021/dsa-5005', 'https://github.com/kaminari/kaminari/commit...
null
{'https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8'}
{'https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8'}
RubyGems
GHSA-9p3v-wf2w-v29c
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scann...
{'CVE-2009-4214'}
2022-03-03T05:12:56.447107Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214', 'http://www.openwall.com/lists/oss-security/2009/12/08/3', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.debian.org/security/2011/dsa-2260', 'http://secunia.com/advisories/38...
null
{'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5'}
{'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5'}
RubyGems
GHSA-9pr6-grf4-x2fr
Omniauth allows POST parameters to be stored in session
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
{'CVE-2017-18076'}
2022-04-25T22:31:54.505893Z
2018-01-29T15:45:28Z
HIGH
null
null
{'https://bugs.debian.org/888523', 'https://github.com/omniauth/omniauth/pull/867', 'https://github.com/omniauth/omniauth', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076', 'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b', 'https://www.debian.org/security/2018/dsa-4109'...
null
{'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b'}
{'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b'}
RubyGems
GHSA-qpg4-4w7w-2mq5
Authentication and extension bypass in Faye
On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1...
{'CVE-2020-11020'}
2022-03-03T05:13:00.204591Z
2020-04-29T17:41:15Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11020', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5'}
null
{'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}
{'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}
RubyGems
GHSA-mg5p-95m9-rmfp
Arbitrary file write in actionpack-page_caching gem
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
{'CVE-2020-8159'}
2022-04-07T15:17:02.937159Z
2020-05-13T16:28:46Z
CRITICAL
null
{'CWE-22'}
{'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
null
{'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
{'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
RubyGems
GHSA-6jvm-3j5h-79f6
Moderate severity vulnerability that affects paperclip
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
{'CVE-2015-2963'}
2022-03-03T05:13:20.403613Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://robots.thoughtbot.com/paperclip-security-release', 'http://www.securityfocus.com/bid/75304', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963', 'https://github.com/thoughtbot/paperclip', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088', 'http://jvn.jp/en/jp/JVN83881261/index.html', 'https://github.com/thoughtbot/...
null
{'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}
{'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}
RubyGems
GHSA-f8cm-364f-q9qh
Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls
### Impact The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints. ### Patches Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. ### Workarounds In your project directory create a decorator file `app/controllers/spree/api/v...
{'CVE-2020-15269'}
2022-03-03T05:14:18.631312Z
2020-10-20T20:03:52Z
HIGH
null
{'CWE-613', 'CWE-287'}
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269', 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh', 'https://github.com/spree/spree'}
null
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'}
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'}
RubyGems
GHSA-59c7-4xj2-hgvw
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
{'CVE-2015-7578'}
2022-03-03T05:12:07.032028Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/rails/rails-html-sanitizer/co...
null
{'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}
{'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}