Lookup for vulnerable packages by Package URL.
| Purl | pkg:gem/safemode@1.3.2 |
| Type | gem |
| Namespace | |
| Name | safemode |
| Version | 1.3.2 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.3.3 |
| Latest_non_vulnerable_version | 1.3.4 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-6sgh-v5u7-w3h9 |
| vulnerability_id |
VCID-6sgh-v5u7-w3h9 |
| summary |
Safe mode bypassing
Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7540 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52429 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52371 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52286 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52329 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7540 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7540, GHSA-5vx5-9q73-wgp4
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgh-v5u7-w3h9 |
|
| 1 |
| url |
VCID-96hp-qxsu-rqa2 |
| vulnerability_id |
VCID-96hp-qxsu-rqa2 |
| summary |
High severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish.
The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-8474-rc7c-wrhp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-96hp-qxsu-rqa2 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-6sgh-v5u7-w3h9 |
| vulnerability_id |
VCID-6sgh-v5u7-w3h9 |
| summary |
Safe mode bypassing
Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7540 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52429 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52371 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52286 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52329 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7540 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7540, GHSA-5vx5-9q73-wgp4
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgh-v5u7-w3h9 |
|
|
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.2 |