ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
RubyGems | GHSA-ggxm-pgc9-g7fp | Arbitrary Code Execution in rdoc | In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | {'CVE-2021-31799'} | 2022-04-22T15:47:43.374950Z | 2021-09-01T18:53:15Z | HIGH | null | {'CWE-74', 'CWE-77'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://security.netapp.com/advisory/ntap-20210902-0004/', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https:/... | null | {'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'} | {'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'} |
RubyGems | GHSA-fwcm-636p-68r5 | Server-side request forgery in CarrierWave | ### Impact
[CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platf... | {'CVE-2021-21288'} | 2022-03-03T05:13:46.424790Z | 2021-02-08T19:16:26Z | LOW | null | {'CWE-918'} | {'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://rubygems.org/gems/carrierwave/', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021... | null | {'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'} | {'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'} |
RubyGems | GHSA-x3rq-r3cm-5vc4 | Business Logic Errors in Publify | Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors. | {'CVE-2022-0524'} | 2022-03-03T05:12:56.204589Z | 2022-02-09T00:00:27Z | HIGH | null | null | {'https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d', 'https://github.com/publify/publify/', 'https://github.com/publify/publify/releases/tag/v9.2.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524', 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5'} | null | {'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5'} | {'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5'} |
RubyGems | GHSA-g89m-3wjw-h857 | Low severity vulnerability that affects puppet | Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name. | {'CVE-2012-3865'} | 2022-03-03T05:13:46.452209Z | 2017-10-24T18:33:37Z | LOW | null | {'CWE-22'} | {'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f', 'https://github.com/puppetlabs/puppet', 'https://bugzilla.redhat.com/show_bug.cgi?id=839131', 'http://www.debian.org/security/2012/dsa-2511', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://github.com/puppetlabs/puppet/commit/d804... | null | {'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6', 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f'} | {'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f', 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6'} |
RubyGems | GHSA-f599-5m7p-hcpf | Moderate severity vulnerability that affects grape | The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter. | {'CVE-2018-3769'} | 2022-03-03T05:13:20.669121Z | 2018-08-13T20:45:32Z | MODERATE | null | {'CWE-79'} | {'https://github.com/ruby-grape/grape/pull/1763', 'https://github.com/advisories/GHSA-f599-5m7p-hcpf', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3769', 'https://github.com/ruby-grape/grape/issues/1762', 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'} | null | {'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'} | {'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'} |
RubyGems | GHSA-xq52-rv6w-397c | Directive injection when using dynamic overrides with user input | ### Impact
If user-supplied input was passed into `append/override_content_security_policy_directives`, a semicolon could be injected leading to directive injection.
This could be used to e.g. override a `script-src` directive. Duplicate directives are ignored and the first one wins. The directives in `secure_headers... | {'CVE-2020-5217'} | 2022-03-03T05:13:11.160362Z | 2020-01-23T02:28:11Z | MODERATE | null | {'CWE-95'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5217', 'https://github.com/twitter/secure_headers/issues/418', 'https://github.com/twitter/secure_headers/pull/421', 'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3', 'https://github.com/twitter/secure_headers/security/advisories/GHS... | null | {'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3'} | {'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3'} |
RubyGems | GHSA-v3rr-cph9-2g2q | Moderate severity vulnerability that affects rack-ssl | Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack. | {'CVE-2014-2538'} | 2022-03-03T05:13:09.421535Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-79'} | {'https://github.com/josh/rack-ssl', 'http://www.securityfocus.com/bid/66314', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538', 'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html', 'https://github.com/advisories/GHSA-v3rr-cph9-2g2q', 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc... | null | {'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b'} | {'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b'} |
RubyGems | GHSA-q58g-455p-8vw9 | In RubyGem excon, interrupted Persistent Connections May Leak Response Data | ### Impact
There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be ... | {'CVE-2019-16779'} | 2022-03-03T05:12:58.973224Z | 2019-12-16T19:30:17Z | MODERATE | null | {'CWE-362', 'CWE-664'} | {'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9', 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html', 'http://lists.opensuse.org/opensuse-securi... | null | {'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'} | {'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'} |
RubyGems | GHSA-hj56-84jw-67h6 | Potential Denial-of-Service in bindata | In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize ther... | {'CVE-2021-32823'} | 2022-03-03T05:13:23.518004Z | 2021-06-23T23:42:04Z | LOW | null | {'CWE-400'} | {'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323', 'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency', 'https://github.com/dmende... | null | {'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323'} | {'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323'} |
RubyGems | GHSA-864j-6qpp-cmrr | SQL Injection in Geocoder | sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when within_bounding_box is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data. | {'CVE-2020-7981'} | 2022-03-03T05:14:07.999518Z | 2020-06-10T20:03:02Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7981', 'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613', 'https://github.com/alexreisner/geocoder', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/geocod... | null | {'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613'} | {'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613'} |
RubyGems | GHSA-78vq-9j56-wrfr | Cross-site Scripting in gon | An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson. | {'CVE-2020-25739'} | 2022-03-03T05:13:59.881533Z | 2021-04-30T17:29:15Z | MODERATE | null | {'CWE-79'} | {'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html', 'https://usn.ubuntu.com/4560-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739', 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'} | null | {'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'} | {'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'} |
RubyGems | GHSA-j5hj-fhc9-g24m | Moderate severity vulnerability that affects rack-mini-profiler | The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks. | {'CVE-2016-4442'} | 2022-03-03T05:10:09.396301Z | 2017-10-24T18:33:35Z | MODERATE | null | {'CWE-200'} | {'https://github.com/advisories/GHSA-j5hj-fhc9-g24m', 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c', 'https://github.com/MiniProfiler/rack-mini-profiler/', 'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md', 'http://www.openwall.com/list... | null | {'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c'} | {'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c'} |
RubyGems | GHSA-8jxj-9r5f-w3m2 | Low severity vulnerability that affects puppet | lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file. | {'CVE-2012-3866'} | 2022-03-03T05:14:03.097740Z | 2017-10-24T18:33:37Z | LOW | null | null | {'http://www.debian.org/security/2012/dsa-2511', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://github.com/advisories/GHSA-8jxj-9r5f-w3m2', 'https://bugzilla.redhat.com/show_bug.cgi?id=839135', 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653... | null | {'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'} | {'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'} |
RubyGems | GHSA-h29f-7f56-j8wh | Moderate severity vulnerability that affects sinatra | An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters. | {'CVE-2018-7212'} | 2022-03-03T05:12:59.959481Z | 2018-02-20T19:23:20Z | MODERATE | null | {'CWE-22'} | {'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c', 'https://github.com/sinatra/sinatra', 'https://github.com/sinatra/sinatra/pull/1379', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212', 'https://github.com/advisories/GHSA-h29f-7f56-j8wh'} | null | {'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c'} | {'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c'} |
RubyGems | GHSA-2gw2-8q9w-cw8p | Ruby-ffi has a DLL loading issue | ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later. | {'CVE-2018-1000201'} | 2022-04-26T18:33:00.711228Z | 2018-08-31T14:55:43Z | HIGH | null | {'CWE-426'} | {'https://github.com/advisories/GHSA-2gw2-8q9w-cw8p', 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201', 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c'} | null | {'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a', 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c'} | {'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a', 'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c'} |
RubyGems | GHSA-j6w9-fv6q-3q52 | Percent-encoded cookies can be used to overwrite existing prefixed cookie names | A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix. | {'CVE-2020-8184'} | 2022-03-03T05:14:04.623248Z | 2020-06-24T17:15:00Z | HIGH | null | {'CWE-784'} | {'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c', 'https://usn.ubuntu.com/4561-1/', 'https://groups.google.com/g/rubyonrails-securit... | null | {'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c'} | {'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c'} |
RubyGems | GHSA-gwrj-88fp-5m36 | Code injection in Narou | Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel. | {'CVE-2021-35514'} | 2022-03-03T05:13:07.602213Z | 2021-07-02T18:36:01Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-35514', 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42', 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627', 'https://vuln.ryotak.me/advisories/51'} | null | {'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42'} | {'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42'} |
RubyGems | GHSA-c6qr-h5vq-59jc | Untrusted users can run pending migrations in production in Rails | There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed
an untrusted user to run any pending migrations on a Rails app running in
production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `co... | {'CVE-2020-8185'} | 2022-03-03T05:14:11.823792Z | 2020-06-24T17:40:33Z | MODERATE | null | {'CWE-400'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8185', 'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2', 'https://github.com/rubysec/ruby-advisory-db/blob/maste... | null | {'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2'} | {'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2'} |
RubyGems | GHSA-p4x4-rw2p-8j8m | Cross-site Scripting in Sanitize | When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist.
You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or... | {'CVE-2020-4054'} | 2022-03-03T05:13:26.390326Z | 2020-06-16T22:08:06Z | HIGH | null | {'CWE-79'} | {'https://usn.ubuntu.com/4543-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://www.debian.org/security/2020/dsa-4730', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rg... | null | {'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'} | {'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9'} |
RubyGems | GHSA-rprj-g6xc-p5gq | Moderate severity vulnerability that affects wicked | Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step. | {'CVE-2013-4413'} | 2022-03-03T05:14:13.648715Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-22'} | {'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://www.securityfocus.com/bid/62891', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413', 'http://secunia.com/advisories/55151', 'https://github.com/schneems/wicked', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/8... | null | {'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'} | {'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'} |
RubyGems | GHSA-qphc-hf5q-v8fc | Open Redirect in actionpack | Specially crafted "X-Forwarded-Host" headers in combination with certain
"allowed host" formats can cause the Host Authorization middleware in Action
Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example,
configuration files that look like this:
`... | {'CVE-2021-44528'} | 2022-04-27T22:32:00.332117Z | 2021-12-14T21:19:08Z | MODERATE | null | {'CWE-601'} | {'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://github.com/rails/rails', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260... | null | {'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'} | {'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815'} |
RubyGems | GHSA-r5hc-9xx5-97rw | Moderate severity vulnerability that affects i18n | Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. | {'CVE-2013-4492'} | 2022-03-03T05:13:54.902315Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445', 'http://www.debian.org/security/2013/dsa-2830', 'https://github.com/svenfuchs/i18n', 'https://nvd.nist.gov/vuln/d... | null | {'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'} | {'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'} |
RubyGems | GHSA-j858-xp5v-f8xx | Remote code execution in Dragonfly | An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMa... | {'CVE-2021-33564'} | 2022-03-03T05:13:58.950700Z | 2021-06-02T21:42:49Z | CRITICAL | null | {'CWE-94', 'CWE-88'} | {'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/markevans/dragonfly/issues/513', 'h... | null | {'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'} | {'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5'} |
RubyGems | GHSA-844m-cpr9-jcmh | Secure/signed cookies share secrets between sites in a multi-site application | ### Impact
This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application.
### Patches
The i... | {'CVE-2021-41263'} | 2022-03-03T05:12:57.242829Z | 2021-11-15T17:54:01Z | MODERATE | null | {'CWE-200', 'CWE-565'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0', 'https://github.com/discourse/rails_multisite'} | null | {'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'} | {'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'} |
RubyGems | GHSA-5pm8-492c-92p5 | Prototype Pollution in chartkick | Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server.
... | {'CVE-2019-18841'} | 2022-03-03T05:12:51.639263Z | 2019-12-02T18:04:11Z | HIGH | null | null | {'https://github.com/ankane/chartkick/commits/master', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://rubygems.org/gems/chartkick/', 'https://github.com/ankane/chartkick.js/issues/117', 'https://chartkick.com', 'https://... | null | {'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'} | {'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'} |
RubyGems | GHSA-r7j3-vvh2-xrpj | OS Command Injection in MiniMagick | In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command. | {'CVE-2019-13574'} | 2022-03-03T05:13:10.705994Z | 2019-07-18T13:19:22Z | HIGH | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-13574', 'https://seclists.org/bugtraq/2019/Jul/20', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html', 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851', 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4'... | null | {'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'} | {'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'} |
RubyGems | GHSA-x7p2-x2j6-mwhr | Moderate severity vulnerability that affects gemirro | Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file. | {'CVE-2017-16833'} | 2022-03-03T05:13:32.757913Z | 2017-11-29T23:19:51Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16833', 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de', 'https://github.com/PierreRambaud/gemirro', 'https://github.com/advisories/GHSA-x7p2-x2j6-mwhr'} | null | {'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'} | {'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'} |
RubyGems | GHSA-73qw-ww62-m54x | Critical severity vulnerability that affects colorscore | The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | {'CVE-2015-7541'} | 2022-03-03T05:12:47.605634Z | 2017-10-24T18:33:36Z | CRITICAL | null | {'CWE-77'} | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'http://rubysec.com/advisories/CVE-2015-7541/', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541', 'http://www.openwall.com/lists/oss-security/2016/01/05/2'} | null | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'} | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'} |
RubyGems | GHSA-q3wr-qw3g-3p4h | Injection/XSS in Redcarpet | Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. ... | {'CVE-2020-26298'} | 2022-03-03T05:13:23.703389Z | 2021-01-11T19:06:10Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26298', 'https://rubygems.org/gems/redcarpet', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html', 'https://github.com/advisories/GHSA-q3wr-qw3g-3p4h', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security', 'https://github.com/vmg/... | null | {'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793'} | {'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793'} |
RubyGems | GHSA-26xx-m4q2-xhq8 | Authentication Bypass by CSRF Weakness | ### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: tr... | {'CVE-2021-41275'} | 2022-03-03T05:12:54.592023Z | 2021-11-18T20:14:19Z | CRITICAL | null | {'CWE-352'} | {'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63', 'https://github.com/spree/spree_auth_devise', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41275', 'https://github.com/spree/spree_auth... | null | {'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63'} | {'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63'} |
RubyGems | GHSA-j24p-r6wx-r79w | High severity vulnerability that affects thin | lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header. | {'CVE-2009-3287'} | 2022-03-03T05:13:18.776632Z | 2017-10-24T18:33:38Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2009-3287', 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a', 'http://www.openwall.com/lists/oss-security/2009/09/12/1', 'http://github.com/macournoyer/thin', 'http://github.com/macournoyer/thin/blob/master/CHANGELOG', 'https://github.com/adviso... | null | {'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a'} | {'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a'} |
RubyGems | GHSA-x7jg-6pwg-fx5h | HTTP Smuggling via Transfer-Encoding Header in Puma | ### Impact
By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling)
Originally reported by @ZeddYu, who has our thanks for the detailed report.
### Patches
The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
### For mo... | {'CVE-2020-11076'} | 2022-03-03T05:13:40.798691Z | 2020-05-22T14:55:05Z | HIGH | null | {'CWE-444'} | {'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076', 'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h', 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd', 'http://lists.opensuse.org/opensuse-security-a... | null | {'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd'} | {'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd'} |
RubyGems | GHSA-qp49-3pvw-x4m5 | sinatra does not validate expanded path matches | Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files. | {'CVE-2022-29970'} | 2022-05-03T21:02:03.543510Z | 2022-05-03T00:00:43Z | MODERATE | null | {'CWE-426'} | {'https://github.com/skylightio/skylight-ruby/pull/294', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29970', 'https://github.com/sinatra/sinatra/', 'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e'} | null | {'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e'} | {'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e'} |
RubyGems | GHSA-v6fx-752r-ccp2 | CSRF on PgHero gem | The PgHero gem through 2.6.0 for Ruby allows CSRF. | {'CVE-2020-16253'} | 2022-03-03T05:13:14.287515Z | 2020-08-05T14:53:43Z | HIGH | null | {'CWE-352'} | {'https://github.com/ankane/pghero/issues/330', 'https://rubygems.org/gems/pghero', 'https://github.com/ankane/pghero', 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml', 'https://github.com/ankane... | null | {'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'} | {'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'} |
RubyGems | GHSA-h6w6-xmqv-7q78 | High severity vulnerability that affects activerecord | Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name. | {'CVE-2011-2930'} | 2022-03-03T05:14:21.566569Z | 2017-10-24T18:33:38Z | HIGH | null | {'CWE-89'} | {'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://... | null | {'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'} | {'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'} |
RubyGems | GHSA-fxwv-953p-7qpf | Phusion Passenger allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header | agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in ... | {'CVE-2015-7519'} | 2022-04-26T18:33:06.194040Z | 2018-10-10T17:29:13Z | LOW | null | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2015/12/07/1', 'https://blog.phusion.nl/2015/12/07/cve-2015-7519/', 'http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html', 'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e', 'https://puppet.com/security/cve/passenge... | null | {'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e'} | {'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e'} |
RubyGems | GHSA-jj47-x69x-mxrm | Buffer Overflow in yajl-ruby | yajl-ruby is a streaming JSON parsing and encoding library for Ruby (C bindings to yajl) based on the YAJL library.
The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs.
### Details
... | {'CVE-2022-24795'} | 2022-04-06T21:16:57.159918Z | 2022-04-05T15:55:51Z | MODERATE | null | {'CWE-190', 'CWE-122'} | {'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6', 'https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm', 'https://github.com/brianmario/yajl-ruby', 'https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_b... | null | {'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6'} | {'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6'} |
RubyGems | GHSA-v5jg-558j-q67c | Moderate severity vulnerability that affects actionpack | Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name. | {'CVE-2011-2931'} | 2022-03-03T05:13:59.190408Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://githu... | null | {'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a'} | {'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a'} |
RubyGems | GHSA-jmgf-p46x-982h | Moderate severity vulnerability that affects rails | CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function. | {'CVE-2008-5189'} | 2022-03-03T05:13:26.680367Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-352'} | {'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d', 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing', 'https://github.com/advisories/GHSA-jmgf-p46x-982h', 'http://github.com/rails/rails', 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189', 'http:... | null | {'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d'} | {'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d'} |
RubyGems | GHSA-9fh3-vh3h-q4g3 | Moderate severity vulnerability that affects activesupport | Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vu... | {'CVE-2011-2932'} | 2022-03-03T05:12:38.166203Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-79'} | {'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd', 'https://bugzilla.redhat.com/show_bug.cgi?id=731435', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain', 'https://github.com/... | null | {'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd'} | {'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd'} |
RubyGems | GHSA-jppv-gw3r-w3q8 | OS Command Injection in Rake | There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`. | {'CVE-2020-8130'} | 2022-03-03T05:13:45.803499Z | 2020-02-28T16:54:36Z | MODERATE | null | {'CWE-78'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/', 'https://hackerone.com/reports/651518', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130', 'https://usn.ubuntu.com/4295-1/', 'https://lists.fedoraproject.org/archives/list/package-announce... | null | {'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee'} | {'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee'} |
RubyGems | GHSA-mgx3-27hr-mfgp | High severity vulnerability that affects httparty | The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a simila... | {'CVE-2013-1801'} | 2022-03-03T05:14:10.324559Z | 2017-10-24T18:33:37Z | HIGH | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=917229', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/jnunemaker/httparty', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801', 'https://github.co... | null | {'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031'} | {'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031'} |
RubyGems | GHSA-cff7-6h4q-q5pj | Lacked element count during splitting of JWE string | The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string. | {'CVE-2019-18848'} | 2022-05-04T02:05:31.585529Z | 2019-11-14T15:25:51Z | HIGH | null | {'CWE-20', 'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-18848', 'https://github.com/nov/json-jwt', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html', 'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0', 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a'} | null | {'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a'} | {'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a'} |
RubyGems | GHSA-85r7-w5mv-c849 | Moderate severity vulnerability that affects rack | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals." | {'CVE-2013-0262'} | 2022-03-03T05:14:17.530513Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-22'} | {'http://secunia.com/advisories/52033', 'https://gist.github.com/rentzsch/4736940', 'https://github.com/advisories/GHSA-85r7-w5mv-c849', 'https://github.com/rack/rack', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262', 'https://bugzilla.redhat.com/show_bug.cgi?id=909071', 'http://rack.github.com/', 'https://github.com/... | null | {'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30'} | {'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30'} |
RubyGems | GHSA-wh98-p28r-vrc9 | Exposure of information in Action Pack | ### Impact
Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next... | {'CVE-2022-23633'} | 2022-03-03T05:13:17.293702Z | 2022-02-11T20:49:14Z | HIGH | null | {'CWE-200'} | {'http://www.openwall.com/lists/oss-security/2022/02/11/5', 'https://github.com/rails/rails', 'https://discuss.rubyonrails.org/t/cve-2022-23633-possible-exposure-of-information-vulnerability-in-action-pack/80016', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23633', 'https://github.com/rails/rails/security/advisories/GHS... | null | {'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da'} | {'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da'} |
RubyGems | GHSA-84j7-475p-hp8v | HTTP Response Splitting in Puma | In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header,
an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content,
such as additional headers or an entirely new response body. This vulnerability is k... | {'CVE-2020-5247'} | 2022-03-03T05:13:06.415138Z | 2020-02-28T16:53:55Z | MODERATE | null | {'CWE-113'} | {'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.... | null | {'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'} | {'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f'} |
RubyGems | GHSA-c7j7-p5jq-26ff | Low severity vulnerability that affects passenger | Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. | {'CVE-2014-1831'} | 2022-03-03T05:13:06.506859Z | 2018-10-10T17:29:20Z | LOW | null | null | {'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://github.com/phusion/passenger', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'https://github.com/advisories/GHSA-c7j7-p5jq-26f... | null | {'https://github.com/phusion/passenger/commit/34b1087870c2'} | {'https://github.com/phusion/passenger/commit/34b1087870c2'} |
RubyGems | GHSA-w6rc-q387-vpgq | Moderate severity vulnerability that affects passenger | ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/. | {'CVE-2013-4136'} | 2022-03-03T05:12:38.652146Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-59'} | {'https://github.com/advisories/GHSA-w6rc-q387-vpgq', 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS', 'https://code.google.com/p/phusion-passenger/issues/detail?id=910', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136', 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9... | null | {'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'} | {'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'} |
RubyGems | GHSA-49r3-2549-3633 | omniauth-apple allows attacker to fake their email address during authentication | ### Impact
This vulnerability impacts applications using the [omniauth-apple](https://github.com/nhosoya/omniauth-apple) strategy of OmniAuth and using the `info.email` field of OmniAuth's [Auth Hash Schema](https://github.com/omniauth/omniauth/wiki/Auth-Hash-Schema) for any kind of identification. The value of this ... | {'CVE-2020-26254'} | 2022-03-03T05:13:18.653035Z | 2020-12-08T14:18:19Z | LOW | null | {'CWE-290'} | {'https://github.com/nhosoya/omniauth-apple/blob/master/CHANGELOG.md#101---2020-12-03', 'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016', 'https://github.com/nhosoya/omniauth-apple/security/advisories/GHSA-49r3-2549-3633', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26254'} | null | {'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016'} | {'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016'} |
RubyGems | GHSA-688c-3x49-6rqj | Moderate severity vulnerability that affects rack-protection | Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 a... | {'CVE-2018-1000119'} | 2022-03-03T05:12:58.358411Z | 2018-03-07T22:22:22Z | MODERATE | null | {'CWE-203'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119', 'https://github.com/sinatra/rack-protection', 'https://www.debian.org/security/2018/dsa-4247', 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109', 'https://github.com/advisories/GHSA-688c-3x49-6rqj', 'https://... | null | {'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb'} | {'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb'} |
RubyGems | GHSA-q97v-764g-r2rp | High severity vulnerability that affects gollum and gollum-lib | The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags. | {'CVE-2014-9489'} | 2022-03-03T05:13:49.192780Z | 2017-11-16T01:47:37Z | HIGH | null | {'CWE-284'} | {'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://github.com/gollum/gollum/issues/913', 'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.securityfocus.com/bid/71499', 'https://github.com/gollum/gollum', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489', '... | null | {'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'} | {'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'} |
RubyGems | GHSA-m2q3-53fq-7h66 | Moderate severity vulnerability that affects gollum | The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check. | {'CVE-2015-7314'} | 2022-03-03T05:12:35.175360Z | 2018-08-28T22:33:51Z | MODERATE | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-7314', 'https://github.com/gollum/gollum/issues/1070', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-... | null | {'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'} | {'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'} |
RubyGems | GHSA-cf36-985g-v73c | Moderate severity vulnerability that affects omniauth-facebook | The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter. | {'CVE-2013-4562'} | 2022-03-03T05:13:58.524578Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-352'} | {'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'http://seclists.org/oss-sec/2013/q4/267', 'http://www.osvdb.org/99693', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt', 'https://github.c... | null | {'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'} | {'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'} |
RubyGems | GHSA-m7fq-cf8q-35q7 | High severity vulnerability that affects crack | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) S... | {'CVE-2013-1800'} | 2022-03-03T05:12:56.495744Z | 2017-10-24T18:33:37Z | HIGH | null | null | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'http://lists.opensuse.org/... | null | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'} | {'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'} |
RubyGems | GHSA-3j95-fjv2-3m4p | CSS Injection in Chartkick gem | The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute). | {'CVE-2020-16254'} | 2022-03-03T05:13:43.419894Z | 2020-08-12T14:29:15Z | MODERATE | null | {'CWE-74'} | {'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/ankane/chartkick', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'} | null | {'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'} | {'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'} |
RubyGems | GHSA-mq35-wqvf-r23c | Sinatra has XSS via 400 Bad Request page via params parser exception | Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception. | {'CVE-2018-11627'} | 2022-04-26T18:17:15.940159Z | 2018-06-05T21:32:06Z | MODERATE | null | {'CWE-79'} | {'https://github.com/sinatra/sinatra', 'https://github.com/sinatra/sinatra/issues/1428', 'https://access.redhat.com/errata/RHSA-2019:0315', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://github.com/advisories/GHSA-mq35-wq... | null | {'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'} | {'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'} |
RubyGems | GHSA-58r4-h6v8-jcvm | Regression in JWT Signature Validation | ### Overview
Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.
### Am I ... | {'CVE-2020-15240'} | 2022-03-03T05:14:16.039069Z | 2020-11-03T02:31:38Z | HIGH | null | {'CWE-347', 'CWE-287'} | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://rubygems.org/gems/omniauth-auth0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm', 'https://github.com/auth0/omniauth-auth0'} | null | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'} | {'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a'} |
RubyGems | GHSA-fcqf-h4h4-695m | Moderate severity vulnerability that affects actionpack | CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header. | {'CVE-2011-3186'} | 2022-03-03T05:12:52.686804Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://secunia.com/advisories/45921', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', ... | null | {'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'} | {'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'} |
RubyGems | GHSA-jrfj-98qg-qjgv | Denial of service in sidekiq | In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users. | {'CVE-2022-23837'} | 2022-03-11T20:16:49.892671Z | 2022-01-27T14:42:37Z | HIGH | null | {'CWE-400', 'CWE-770'} | {'https://github.com/mperham/sidekiq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23837', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.co... | null | {'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'} | {'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'} |
RubyGems | GHSA-7vxr-6cxg-j3x8 | OS Command Injection in ftpd | The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic. | {'CVE-2013-2512'} | 2022-03-03T05:13:15.551362Z | 2021-10-12T22:33:59Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c', 'http://vapidlabs.com/advisory.php?v=34', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512', 'https://github.com/wconrad/ftpd'} | null | {'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'} | {'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'} |
RubyGems | GHSA-j5rj-g695-342r | Moderate severity vulnerability that affects fat_free_crm | FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be ... | {'CVE-2018-1000842'} | 2022-03-03T05:13:50.305320Z | 2018-12-20T22:01:54Z | MODERATE | null | {'CWE-79'} | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/advisories/GHSA-j5rj-g695-342r', 'https://github.com/asteinhauser/fat_free_c... | null | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'} | {'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'} |
RubyGems | GHSA-r53w-g4xm-3gc6 | Cross-site scripting in Haml | In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code. | {'CVE-2017-1002201'} | 2022-03-03T05:14:02.155160Z | 2019-10-21T21:59:13Z | MODERATE | null | {'CWE-79'} | {'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://security.gentoo.org/glsa/202007-27', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2', 'https://github.com/haml/... | null | {'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'} | {'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'} |
RubyGems | GHSA-pr3h-jjhj-573x | High severity vulnerability that affects sprockets | Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production.
All users running an affected release should either upgrade or use one of the work arounds immediately.
Workaround:
In Rails appl... | {'CVE-2018-3760'} | 2022-03-03T05:12:55.724463Z | 2018-06-20T22:18:58Z | HIGH | null | {'CWE-22', 'CWE-200'} | {'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441', 'https://www.debian.org/security/2018/dsa-4242', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb... | null | {'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441'} | {'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441', 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f'} |
RubyGems | GHSA-xmgj-5fh3-xjmm | Path traversal when MessageBus::Diagnostics is enabled | ### Impact
Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for you... | {'CVE-2021-43840'} | 2022-03-03T05:13:02.780448Z | 2021-12-17T19:59:13Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43840', 'https://github.com/discourse/message_bus', 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'} | null | {'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'} | {'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba'} |
RubyGems | GHSA-w3j4-76qw-wwjm | Older releases of better_errors open to Cross-Site Request Forgery attack | ### Impact
better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabl... | {'CVE-2021-39197'} | 2022-03-03T05:14:16.248141Z | 2021-09-07T23:08:24Z | MODERATE | null | {'CWE-352'} | {'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0', 'https://github.com/BetterErrors/better_errors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197', 'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/BetterErrors/... | null | {'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0'} | {'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0'} |
RubyGems | GHSA-2xvj-j3qh-x8c3 | High severity vulnerability that affects private_address_check | private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address. | {'CVE-2018-3759'} | 2022-03-03T05:12:45.204597Z | 2018-07-31T18:13:05Z | HIGH | null | {'CWE-362'} | {'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759', 'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3'} | null | {'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'} | {'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'} |
RubyGems | GHSA-23f7-99jx-m54r | Remote code execution in dependabot-core branch names when cloning | ### Impact
Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code.
For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the fo... | {'CVE-2020-26222'} | 2022-03-03T05:13:27.535302Z | 2020-11-13T15:47:50Z | LOW | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26222', 'https://rubygems.org/gems/dependabot-common', 'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r', 'https://rubygems.org/gems/dependabot-omnibus', 'https://github.com/dependabot/dependabot-core/pull/2727', 'https://github.com/depen... | null | {'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5'} | {'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5'} |
RubyGems | GHSA-vr8q-g5c7-m54m | XXE in Nokogiri | ### Severity
Nokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N).
### Description
In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing exte... | {'CVE-2020-26247'} | 2022-03-03T05:14:07.122463Z | 2020-12-30T18:35:06Z | MODERATE | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26247', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m', 'https://rubygems.org/gems/nokogiri', 'https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--20... | null | {'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b'} | {'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b'} |
RubyGems | GHSA-cf3w-g86h-35x4 | Code Injection vulnerability in CarrierWave::RMagick | ### Impact
[CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be e... | {'CVE-2021-21305'} | 2022-04-27T20:00:06.549782Z | 2021-02-08T19:16:39Z | HIGH | null | {'CWE-94', 'CWE-74'} | {'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305', 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7', 'https://github.... | null | {'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7'} | {'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7'} |
RubyGems | GHSA-cxf7-qrc5-9446 | Remote shell execution vulnerability in image_processing | ### Impact
When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands:
```rb
ImageProcessing::Vips.apply({ system: "echo EXECUTED" })
#>> EXECUTED
```
This method is called internally by Active S... | {'CVE-2022-24720'} | 2022-03-10T16:02:30.163279Z | 2022-03-01T22:22:26Z | CRITICAL | null | {'CWE-20', 'CWE-78'} | {'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24720', 'https://github.com/janko/image_processing', 'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'} | null | {'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'} | {'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'} |
RubyGems | GHSA-cqxw-3p7v-p9gr | Phusion Passenger uses a known /tmp filename | In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user | {'CVE-2016-10345'} | 2022-04-26T20:45:11.460991Z | 2018-08-21T17:08:03Z | HIGH | null | null | {'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441', 'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10345', 'https://github.com/phusion/passenger/', 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr'} | null | {'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'} | {'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441'} |
RubyGems | GHSA-r74q-gxcg-73hx | High severity vulnerability that affects simple_form | ## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call
### Impact
For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example:
```erb
<%=... | {'CVE-2019-16676'} | 2022-03-03T05:11:44.264367Z | 2019-09-30T19:41:15Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx', 'https://github.com/advisories/GHSA-r74q-gxcg-73hx', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16676', 'https://github.com/plataformatec/simple_form/commits/master', 'http://blog.plataformatec.com.br/2019/09/incorrect-access-contr... | null | {'https://github.com/plataformatec/simple_form/commits/master'} | {'https://github.com/plataformatec/simple_form/commits/master'} |
RubyGems | GHSA-x24j-87x9-jvv5 | Improper Authorization in Publify | In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only. | {'CVE-2021-25973'} | 2022-03-07T20:47:49.397012Z | 2021-11-03T17:34:22Z | MODERATE | null | {'CWE-285', 'CWE-863'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25973', 'https://github.com/publify/publify/', 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'} | null | {'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'} | {'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'} |
RubyGems | GHSA-r7q2-5gqg-6c7q | Moderate severity vulnerability that affects actionpack | The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." | {'CVE-2011-2929'} | 2022-03-03T05:13:11.142719Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'https://github.com/advisories/GHSA-r7q2-5gqg-6c7q', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=731432', 'http... | null | {'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'} | {'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'} |
RubyGems | GHSA-ghqm-pgxj-37gq | Moderate severity vulnerability that affects rails-html-sanitizer | Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node. | {'CVE-2015-7580'} | 2022-03-03T05:13:29.804586Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-79'} | {'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580', 'https://github.com/rails/rails-html-sanitizer/co... | null | {'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'} | {'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'} |
crates.io | GHSA-qc36-q22q-cjw3 | SMTP command injection in lettre | ### Impact
Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP comma... | {'CVE-2021-38189'} | 2021-08-18T18:52:26Z | 2021-07-12T17:03:27Z | CRITICAL | null | {'CWE-147'} | {'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3', 'https://github.com/lettre/lettre', 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2', 'https://github.com/lettre/lettre/commit/8bfc20506cc5e09... | null | {'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'} | {'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'} |
crates.io | GHSA-r626-fc64-3q28 | Data race in abox | An issue was discovered in the abox crate before 0.4.1 for Rust.
Affected versions of this crate implements `Send`/`Sync` for `AtomicBox<T>` without requiring `T: Send`/`T: Sync`. This allows to create data races to `T: !Sync` and send `T: !Send` to another thread.
Such behavior breaks the compile-time thread safety... | {'CVE-2020-36441'} | 2021-08-24T19:15:13Z | 2021-08-25T20:59:06Z | HIGH | null | {'CWE-119', 'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0121.html', 'https://github.com/SonicFrog/abox/commit/34c2b9e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36441', 'https://github.com/SonicFrog/abox/pull/2', 'https://github.com/SonicFrog/abox/issues/1', 'https://github.com/SonicFrog/abox'} | null | {'https://github.com/SonicFrog/abox/commit/34c2b9e'} | {'https://github.com/SonicFrog/abox/commit/34c2b9e'} |
crates.io | GHSA-4873-36h9-wv49 | Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime | ### Impact
There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime.
To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm... | {'CVE-2021-39218'} | 2021-09-17T20:05:58Z | 2021-09-20T19:54:16Z | MODERATE | null | {'CWE-590', 'CWE-125', 'CWE-787'} | {'https://crates.io/crates/wasmtime', 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://lists.fedoraproject.org/archives/list/package... | null | {'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'} | {'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'} |
crates.io | GHSA-vc2p-r46x-m3vx | Argument injection in lettre | ### Impact
Affected versions of lettre allowed argument injection to the sendmail command. It was possible, using forged to addresses, to pass arbitrary arguments to the sendmail executable.
Depending on the implementation (original sendmail, postfix, exim, etc.) it could be possible in some cases to write email data... | {'CVE-2020-28247'} | 2021-08-18T20:59:57Z | 2021-08-25T20:56:48Z | MODERATE | null | {'CWE-77'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0069.html', 'https://github.com/lettre/lettre', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28247', 'https://github.com/RustSec/advisory-db/pull/478/files', 'https://github.com/lettre/lettre/pull/508/commits/bbe7cc5381c5380b54fb8bbb4f77a3725917ff0b', 'https://github.com/lett... | null | {'https://github.com/lettre/lettre/pull/508/commits/bbe7cc5381c5380b54fb8bbb4f77a3725917ff0b'} | {'https://github.com/lettre/lettre/pull/508/commits/bbe7cc5381c5380b54fb8bbb4f77a3725917ff0b'} |
crates.io | GHSA-88xq-w8cq-xfg7 | Invalid drop of partially-initialized instances in the pooling instance allocator for modules with defined `externref` globals | ### Impact
There exists a bug in the pooling instance allocator in Wasmtime's runtime where a failure to instantiate an instance for a module that defines an `externref` global will result in an invalid drop of a `VMExternRef` via an uninitialized pointer.
As instance slots may be reused between consecutive instantia... | {'CVE-2022-23636'} | 2022-02-16T22:35:03Z | 2022-02-16T22:35:03Z | MODERATE | null | {'CWE-824'} | {'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-88xq-w8cq-xfg7', 'https://github.com/bytecodealliance/wasmtime', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23636', 'https://github.com/bytecodealliance/wasmtime/commit/886ecc562040bef61faf19438c22285c2d62403a'} | null | {'https://github.com/bytecodealliance/wasmtime/commit/886ecc562040bef61faf19438c22285c2d62403a'} | {'https://github.com/bytecodealliance/wasmtime/commit/886ecc562040bef61faf19438c22285c2d62403a'} |
crates.io | GHSA-2wc6-2rcj-8v76 | scalarmult() vulnerable to degenerate public keys | The `scalarmult()` function included in previous versions of this crate
accepted all-zero public keys, for which the resulting Diffie-Hellman shared
secret will always be zero regardless of the private key used.
This issue was fixed by checking for this class of keys and rejecting them
if they are used.
| {'CVE-2017-1000168'} | 2021-08-05T21:10:47Z | 2021-08-25T21:00:41Z | MODERATE | null | {'CWE-1240'} | {'https://github.com/sodiumoxide/sodiumoxide', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000168', 'https://rustsec.org/advisories/RUSTSEC-2017-0001.html', 'https://github.com/dnaq/sodiumoxide/issues/154', 'https://github.com/sodiumoxide/sodiumoxide/commit/24c7a5550807ac8a09648b5878f19d14c3a69135'} | null | {'https://github.com/sodiumoxide/sodiumoxide/commit/24c7a5550807ac8a09648b5878f19d14c3a69135'} | {'https://github.com/sodiumoxide/sodiumoxide/commit/24c7a5550807ac8a09648b5878f19d14c3a69135'} |
crates.io | GHSA-q3cc-7p7g-392c | Use after free in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because sessions.rs has a use-after-free. | {'CVE-2020-35873'} | 2021-08-19T21:08:56Z | 2021-08-25T20:47:43Z | CRITICAL | null | {'CWE-416'} | {'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35873', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/rusqlite/rusqlite/commit/ac30e169ae51b262bc8cf7026469851ce39b23c6'} | null | {'https://github.com/rusqlite/rusqlite/commit/ac30e169ae51b262bc8cf7026469851ce39b23c6'} | {'https://github.com/rusqlite/rusqlite/commit/ac30e169ae51b262bc8cf7026469851ce39b23c6'} |
crates.io | GHSA-m296-j53x-xv95 | Data races in tiny_future | `tiny_future` contains a light-weight implementation of `Future`s. The `Future`
type it has lacked bound on its `Send` and `Sync` traits.
This allows for a bug where non-thread safe types such as `Cell` can be used in
`Future`s and cause data races in concurrent programs.
The flaw was corrected in commit `c791919` by... | null | 2021-08-18T23:36:06Z | 2021-08-25T21:00:32Z | MODERATE | null | {'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0118.html', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39', 'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/issues/1', 'https://github.com/Kizzy... | null | {'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'} | {'https://github.com/KizzyCode/tiny_future/commit/c7919199a0f6d1ce0e3c33499d1b37f862c990e4', 'https://github.com/KizzyCode/tiny_future/commit/7ab8a264980d23c2ed64e72f4636f38b7381eb39'} |
crates.io | GHSA-8h4j-vm3r-vcq3 | Use after free in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API use-after-free. | {'CVE-2020-35870'} | 2021-08-19T21:08:47Z | 2021-08-25T20:47:48Z | CRITICAL | null | {'CWE-416'} | {'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35870'} | null | {'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'} | {'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'} |
crates.io | GHSA-gq4h-f254-7cw9 | Data races in ticketed_lock | Affected versions of this crate unconditionally implemented `Send` for `ReadTicket<T>` & `WriteTicket<T>`.
This allows to send non-Send `T` to other threads.
This can allows creating data races by cloning types with internal mutability and sending them to other threads (as `T` of `ReadTicket<T>`/`WriteTicket<T>`). Suc... | null | 2021-08-18T23:35:09Z | 2021-08-25T21:00:34Z | MODERATE | null | {'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0119.html', 'https://github.com/kvark/ticketed_lock/issues/7', 'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'} | null | {'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'} | {'https://github.com/kvark/ticketed_lock/pull/8/commits/a986a9335d591fa5c826157d1674d47aa525357f'} |
crates.io | GHSA-p24j-h477-76q3 | Uncontrolled Search Path Element in sharkdp/bat | bat on windows before 0.18.2 executes programs named less.exe from the current working directory. This can lead to unintended code execution. | {'CVE-2021-36753'} | 2021-09-09T16:57:53Z | 2021-08-25T21:01:37Z | HIGH | null | {'CWE-427'} | {'https://github.com/sharkdp/bat', 'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956', 'https://github.com/sharkdp/bat/releases/tag/v0.18.2', 'https://github.com/sharkdp/bat/pull/1724', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36753', 'https://vuln.ryotak.me/advisories/53'} | null | {'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'} | {'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'} |
crates.io | GHSA-f6g6-54hm-fhxv | Data races in libsbc | Affected versions of this crate implements `Send` for `Decoder<R>` for any `R: Read`. This allows `Decoder<R>` to contain `R: !Send` and carry (move) it to another thread.
This can result in undefined behavior such as memory corruption from data race on `R`, or dropping `R = MutexGuard<_>` from a thread that didn't lo... | {'CVE-2020-36440'} | 2021-08-18T19:58:56Z | 2021-08-25T20:59:02Z | HIGH | null | {'CWE-119', 'CWE-362'} | {'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36440', 'https://rustsec.org/advisories/RUSTSEC-2020-0120.html', 'https://github.com/mvertescher/libsbc-rs'} | null | {'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'} | {'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'} |
crates.io | GHSA-hpqh-2wqx-7qp5 | Memory access due to code generation flaw in Cranelift module | There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0... | {'CVE-2021-32629'} | 2022-04-26T18:11:37Z | 2021-08-25T21:01:55Z | HIGH | null | {'CWE-125'} | {'https://github.com/RustSec/advisory-db/blob/main/crates/cranelift-codegen/RUSTSEC-2021-0067.md', 'https://www.fastly.com/security-advisories/memory-access-due-to-code-generation-flaw-in-cranelift-module', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32629', 'https://github.com/bytecodealliance/wasmtime/commit/95559c01a... | null | {'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'} | {'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'} |
crates.io | GHSA-686f-ch3r-xwmh | Data races in unicycle | Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads.
This can result in a data race & memory corruption when types that provide interna... | {'CVE-2020-36436'} | 2021-08-24T17:47:59Z | 2021-08-25T20:58:17Z | HIGH | null | {'CWE-119', 'CWE-362'} | {'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html', 'https://github.com/udoprog/unicycle/issues/8', 'https://nvd.nist.gov/vuln/detail/CVE-20... | null | {'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'} | {'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'} |
crates.io | RUSTSEC-2018-0014 | chan is end-of-life; use crossbeam-channel instead | **`chan` has reached its end-of-life and is now deprecated.**
The intended successor of this crate is
[`crossbeam-channel`](https://github.com/crossbeam-rs/crossbeam/tree/master/crossbeam-channel).
Its API is strikingly similar, but comes with a much better `select!` macro,
better performance, a better test suite and ... | null | 2020-10-02T01:29:11Z | 2018-07-31T12:00:00Z | null | null | null | {'https://crates.io/crates/chan', 'https://github.com/BurntSushi/chan/commit/0a5c0d4ad4adc90a54ee04a427389acf2e157275', 'https://rustsec.org/advisories/RUSTSEC-2018-0014.html'} | null | {'https://github.com/BurntSushi/chan/commit/0a5c0d4ad4adc90a54ee04a427389acf2e157275'} | {'https://github.com/BurntSushi/chan/commit/0a5c0d4ad4adc90a54ee04a427389acf2e157275'} |
crates.io | RUSTSEC-2021-0069 | SMTP command injection in body | Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it... | {'GHSA-qc36-q22q-cjw3', 'CVE-2021-38189'} | 2021-10-19T19:56:47Z | 2021-05-22T12:00:00Z | null | null | null | {'https://rustsec.org/advisories/RUSTSEC-2021-0069.html', 'https://crates.io/crates/lettre', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'} | null | {'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'} | {'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'} |
crates.io | GHSA-hf79-8hjp-rrvq | Use After Free in lucet | ### Impact
There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, an... | {'CVE-2021-43790'} | 2021-11-30T22:05:58Z | 2021-11-30T22:20:36Z | HIGH | null | {'CWE-416'} | {'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8', 'https://crates.io/crates/lucet-runtime', 'https://github.com/bytecodealliance/lucet', 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43790'} | null | {'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'} | {'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'} |
crates.io | GHSA-gx5w-rrhp-f436 | XSS in mdBook | > This is a cross-post of [the official security advisory][ml]. The official post contains a signed version with our PGP key, as well.
[ml]: https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0
The Rust Security Response Working Group was recently notified of a security issue affecting the search... | {'CVE-2020-26297'} | 2021-08-18T21:06:53Z | 2021-08-25T20:56:20Z | HIGH | null | {'CWE-79'} | {'https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26297', 'https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0', 'https://rustsec.org/advisories/RUSTSEC-2021-0001.html', 'https://github.com/rust-lang/mdBook', 'https://github.com/... | null | {'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'} | {'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'} |
crates.io | GHSA-fqq2-xp7m-xvm8 | Data race in ruspiro-singleton | `Singleton<T>` is meant to be a static object that can be initialized lazily. In
order to satisfy the requirement that `static` items must implement `Sync`,
`Singleton` implemented both `Sync` and `Send` unconditionally.
This allows for a bug where non-`Sync` types such as `Cell` can be used in
singletons and cause da... | {'CVE-2020-36435'} | 2021-08-24T17:45:32Z | 2021-08-25T20:58:19Z | HIGH | null | {'CWE-119', 'CWE-362'} | {'https://github.com/RusPiRo/ruspiro-singleton', 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html', 'https://github.com/RusPiRo/ruspiro-singleton/pull/11', 'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36435', 'https://gi... | null | {'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'} | {'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'} |
crates.io | RUSTSEC-2020-0025 | bigint is unmaintained, use uint instead | The `bigint` crate is not maintained any more and contains several known bugs (including a soundness bug);
use [`uint`](https://crates.io/crates/uint) instead. | {'CVE-2020-35880'} | 2021-10-19T22:14:35Z | 2020-05-07T12:00:00Z | null | null | null | {'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42', 'https://rustsec.org/advisories/RUSTSEC-2020-0025.html', 'https://crates.io/crates/bigint'} | null | {'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42'} | {'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42'} |
crates.io | GHSA-f3pg-qwvg-p99c | Lenient Parsing of Content-Length Header When Prefixed with Plus Sign | ### Summary
hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can resul... | {'CVE-2021-32715'} | 2021-09-07T21:49:21Z | 2021-07-12T16:54:20Z | LOW | null | {'CWE-444'} | {'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715', 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html', 'https://github.com/hyperium/hyper', 'https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c'} | null | {'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'} | {'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'} |
crates.io | GHSA-rmff-f8w9-c9rm | Data races in max7301 | The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained
`Expander<EI>` types regardless of if the `Expander` itself is safe to use
across threads.
As the `IO` types allow retrieving the `Expander`, this can lead to non-thread
safe types being sent across threads as part of the `Expander` leadi... | {'CVE-2020-36472'} | 2021-08-18T19:14:45Z | 2021-08-25T20:59:22Z | MODERATE | null | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36472', 'https://github.com/edarc/max7301', 'https://github.com/edarc/max7301/issues/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html', 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'} | null | {'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'} | {'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'} |
crates.io | GHSA-hpcx-3pw8-g3j2 | Free of uninitialized memory in telemetry | An issue was discovered in the telemetry crate through 0.1.2 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size(). | {'CVE-2021-29937'} | 2021-08-19T17:09:26Z | 2021-08-25T20:54:22Z | CRITICAL | null | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29937', 'https://github.com/Yoric/telemetry.rs/issues/45', 'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81', 'https://rustsec.org/advisories/RUSTSEC-2021-0046.html', 'https://github.com/Yoric/telemetry.rs'} | null | {'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'} | {'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'} |
crates.io | GHSA-g4w7-3qr8-5623 | Improper type usage in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type. | {'CVE-2020-35872'} | 2021-08-19T21:18:44Z | 2021-08-25T20:47:01Z | CRITICAL | null | {'CWE-351'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35872', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite', 'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'} | null | {'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'} | {'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'} |
crates.io | GHSA-v4cp-h94r-m7xf | Use after free passing `externref`s to Wasm in Wasmtime | ### Impact
There was a use-after-free bug when passing `externref`s from the host to guest Wasm content.
To trigger the bug, you have to explicitly pass multiple `externref`s from the host to a Wasm instance at the same time, either by
* passing multiple `externref`s as arguments from host code to a Wasm function,
*... | {'CVE-2021-39216'} | 2021-09-17T20:05:21Z | 2021-09-20T19:54:05Z | MODERATE | null | {'CWE-416'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/', 'https://github.com/bytecodealliance/wasmtime/security/... | null | {'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3'} | {'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.