Lookup for vulnerable packages by Package URL.

Purlpkg:gem/safemode@1.3.2
Typegem
Namespace
Namesafemode
Version1.3.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.3.3
Latest_non_vulnerable_version1.3.4
Affected_by_vulnerabilities
0
url VCID-6sgh-v5u7-w3h9
vulnerability_id VCID-6sgh-v5u7-w3h9
summary
Safe mode bypassing
Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7540.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7540
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52429
published_at 2026-04-16T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.5239
published_at 2026-04-13T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52404
published_at 2026-04-12T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5242
published_at 2026-04-11T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52371
published_at 2026-04-09T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52375
published_at 2026-04-08T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52322
published_at 2026-04-07T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52357
published_at 2026-04-04T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52286
published_at 2026-04-01T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52329
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7540
2
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml
3
reference_url https://github.com/svenfuchs/safemode
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode
4
reference_url https://github.com/svenfuchs/safemode/pull/23
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode/pull/23
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473243
reference_id 1473243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473243
7
reference_url https://github.com/advisories/GHSA-5vx5-9q73-wgp4
reference_id GHSA-5vx5-9q73-wgp4
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5vx5-9q73-wgp4
fixed_packages
0
url pkg:gem/safemode@1.3.4
purl pkg:gem/safemode@1.3.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.4
aliases CVE-2017-7540, GHSA-5vx5-9q73-wgp4
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgh-v5u7-w3h9
1
url VCID-96hp-qxsu-rqa2
vulnerability_id VCID-96hp-qxsu-rqa2
summary
High severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish.

The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
references
0
reference_url https://github.com/advisories/GHSA-8474-rc7c-wrhp
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-8474-rc7c-wrhp
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
fixed_packages
0
url pkg:gem/safemode@1.3.3
purl pkg:gem/safemode@1.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.3
aliases GHSA-8474-rc7c-wrhp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96hp-qxsu-rqa2
Fixing_vulnerabilities
0
url VCID-6sgh-v5u7-w3h9
vulnerability_id VCID-6sgh-v5u7-w3h9
summary
Safe mode bypassing
Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7540.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7540
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52429
published_at 2026-04-16T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.5239
published_at 2026-04-13T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52404
published_at 2026-04-12T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5242
published_at 2026-04-11T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52371
published_at 2026-04-09T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52375
published_at 2026-04-08T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52322
published_at 2026-04-07T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52357
published_at 2026-04-04T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52286
published_at 2026-04-01T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52329
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7540
2
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml
3
reference_url https://github.com/svenfuchs/safemode
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode
4
reference_url https://github.com/svenfuchs/safemode/pull/23
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode/pull/23
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473243
reference_id 1473243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473243
7
reference_url https://github.com/advisories/GHSA-5vx5-9q73-wgp4
reference_id GHSA-5vx5-9q73-wgp4
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5vx5-9q73-wgp4
fixed_packages
0
url pkg:gem/safemode@1.3.2
purl pkg:gem/safemode@1.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6sgh-v5u7-w3h9
1
vulnerability VCID-96hp-qxsu-rqa2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.2
1
url pkg:gem/safemode@1.3.4
purl pkg:gem/safemode@1.3.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.4
aliases CVE-2017-7540, GHSA-5vx5-9q73-wgp4
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgh-v5u7-w3h9
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.2