Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/53763?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53763?format=api", "vulnerability_id": "VCID-kkef-q9fm-xuhw", "summary": "TZInfo relative path traversal vulnerability allows loading of arbitrary files\n### Impact\n\n#### Affected versions\n\n - 0.3.60 and earlier.\n - 1.0.0 to 1.2.9 when used with the Ruby data source (tzinfo-data).\n\n#### Vulnerability \n\nWith the Ruby data source (the tzinfo-data gem for tzinfo version 1.0.0 and later and built-in to earlier versions), time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process.\n\nFor example, with version 1.2.9, you can run the following to load a file with path `/tmp/payload.rb`:\n\n```ruby\nTZInfo::Timezone.get(\"foo\\n/../../../../../../../../../../../../../../../../tmp/payload\")\n```\n\nThe exact number of parent directory traversals needed will vary depending on the location of the tzinfo-data gem.\n\nTZInfo versions 1.2.6 to 1.2.9 can be made to load files from outside of the Ruby load path. Versions up to and including 1.2.5 can only be made to load files from directories within the load path. \n\nThis could be exploited in, for example, a Ruby on Rails application using tzinfo version 1.2.9, that allows file uploads and has a time zone selector that accepts arbitrary time zone identifiers. The CVSS score and severity have been set on this basis.\n\nVersions 2.0.0 and later are not vulnerable.\n\n### Patches\n\nVersions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers (commit 9eddbb5c0e682736f61d0dd803b6031a5db9eadf for 0.3.x and commit 9905ca93abf7bf3e387bd592406e403cd18334c7 for 1.2.x).\n\nNote that version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of `tzinfo/definition` within a directory in the load path. For example if `/tmp/upload` was in the load path, then `TZInfo::Timezone.get('foo')` could load a file with path `/tmp/upload/tzinfo/definition/foo.rb`. Applications should ensure that untrusted files are not placed in a directory on the load path.\n\n### Workarounds\n\nAs a workaround, the time zone identifier can be validated before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression `\\A[A-Za-z0-9+\\-_]+(?:\\/[A-Za-z0-9+\\-_]+)*\\z`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n - Open an issue in [the tzinfo repository](https://github.com/tzinfo/tzinfo).", "aliases": [ { "alias": "CVE-2022-31163" }, { "alias": "GHSA-5cm2-9h8c-rvfx" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938458?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.2.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.2.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938459?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.2.6-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.2.6-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938457?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@2.0.4-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@2.0.4-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938456?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@2.0.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@2.0.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1058671?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@2.0.5-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@2.0.5-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/938460?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@2.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@2.0.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/81313?format=api", "purl": "pkg:gem/tzinfo@0.3.61", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.61" }, { "url": "http://public2.vulnerablecode.io/api/packages/81314?format=api", "purl": "pkg:gem/tzinfo@1.2.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.10" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1058665?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@0.3.33-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@0.3.33-3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1058666?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.1.0-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.1.0-2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1058667?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.1.0-2%2Bdeb8u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.1.0-2%252Bdeb8u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1058668?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.2.2-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.2.2-2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1058669?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.2.5-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.2.5-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1058670?format=api", "purl": "pkg:deb/debian/ruby-tzinfo@1.2.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-tzinfo@1.2.6-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322462?format=api", "purl": "pkg:gem/tzinfo@0.0.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322463?format=api", "purl": "pkg:gem/tzinfo@0.0.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/322464?format=api", "purl": "pkg:gem/tzinfo@0.0.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.0.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/322465?format=api", "purl": "pkg:gem/tzinfo@0.0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/322466?format=api", "purl": "pkg:gem/tzinfo@0.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.1.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322467?format=api", "purl": "pkg:gem/tzinfo@0.1.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.1.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322468?format=api", "purl": "pkg:gem/tzinfo@0.1.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.1.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/322469?format=api", "purl": "pkg:gem/tzinfo@0.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.2.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322470?format=api", "purl": "pkg:gem/tzinfo@0.2.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.2.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322471?format=api", "purl": "pkg:gem/tzinfo@0.2.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.2.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/322472?format=api", "purl": "pkg:gem/tzinfo@0.3.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322473?format=api", "purl": "pkg:gem/tzinfo@0.3.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322474?format=api", "purl": "pkg:gem/tzinfo@0.3.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/322475?format=api", "purl": "pkg:gem/tzinfo@0.3.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/322476?format=api", "purl": "pkg:gem/tzinfo@0.3.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/322477?format=api", "purl": "pkg:gem/tzinfo@0.3.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.5" }, { "url": "http://public2.vulnerablecode.io/api/packages/322478?format=api", "purl": "pkg:gem/tzinfo@0.3.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/322479?format=api", "purl": "pkg:gem/tzinfo@0.3.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/322480?format=api", "purl": "pkg:gem/tzinfo@0.3.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/322481?format=api", "purl": "pkg:gem/tzinfo@0.3.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/322482?format=api", "purl": "pkg:gem/tzinfo@0.3.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/322483?format=api", "purl": "pkg:gem/tzinfo@0.3.11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/322484?format=api", "purl": "pkg:gem/tzinfo@0.3.12", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/322485?format=api", "purl": "pkg:gem/tzinfo@0.3.13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.13" }, { "url": "http://public2.vulnerablecode.io/api/packages/322486?format=api", "purl": "pkg:gem/tzinfo@0.3.14", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/322487?format=api", "purl": "pkg:gem/tzinfo@0.3.15", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/322488?format=api", "purl": "pkg:gem/tzinfo@0.3.16", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.16" }, { "url": "http://public2.vulnerablecode.io/api/packages/322489?format=api", "purl": "pkg:gem/tzinfo@0.3.17", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.17" }, { "url": "http://public2.vulnerablecode.io/api/packages/322490?format=api", "purl": "pkg:gem/tzinfo@0.3.18", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.18" }, { "url": "http://public2.vulnerablecode.io/api/packages/322491?format=api", "purl": "pkg:gem/tzinfo@0.3.19", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.19" }, { "url": "http://public2.vulnerablecode.io/api/packages/322492?format=api", "purl": "pkg:gem/tzinfo@0.3.20", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.20" }, { "url": "http://public2.vulnerablecode.io/api/packages/322493?format=api", "purl": "pkg:gem/tzinfo@0.3.21", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/322494?format=api", "purl": "pkg:gem/tzinfo@0.3.22", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.22" }, { "url": "http://public2.vulnerablecode.io/api/packages/322495?format=api", "purl": "pkg:gem/tzinfo@0.3.23", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.23" }, { "url": "http://public2.vulnerablecode.io/api/packages/322496?format=api", "purl": "pkg:gem/tzinfo@0.3.24", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.24" }, { "url": "http://public2.vulnerablecode.io/api/packages/322497?format=api", "purl": "pkg:gem/tzinfo@0.3.25", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.25" }, { "url": "http://public2.vulnerablecode.io/api/packages/322498?format=api", "purl": "pkg:gem/tzinfo@0.3.26", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/322499?format=api", "purl": "pkg:gem/tzinfo@0.3.27", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.27" }, { "url": "http://public2.vulnerablecode.io/api/packages/322500?format=api", "purl": "pkg:gem/tzinfo@0.3.28", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.28" }, { "url": "http://public2.vulnerablecode.io/api/packages/322501?format=api", "purl": "pkg:gem/tzinfo@0.3.29", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.29" }, { "url": "http://public2.vulnerablecode.io/api/packages/322502?format=api", "purl": "pkg:gem/tzinfo@0.3.30", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.30" }, { "url": "http://public2.vulnerablecode.io/api/packages/322503?format=api", "purl": "pkg:gem/tzinfo@0.3.31", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.31" }, { "url": "http://public2.vulnerablecode.io/api/packages/322504?format=api", "purl": "pkg:gem/tzinfo@0.3.32", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.32" }, { "url": "http://public2.vulnerablecode.io/api/packages/322505?format=api", "purl": "pkg:gem/tzinfo@0.3.33", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.33" }, { "url": "http://public2.vulnerablecode.io/api/packages/322506?format=api", "purl": "pkg:gem/tzinfo@0.3.34", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/322507?format=api", "purl": "pkg:gem/tzinfo@0.3.35", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.35" }, { "url": "http://public2.vulnerablecode.io/api/packages/322508?format=api", "purl": "pkg:gem/tzinfo@0.3.36", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.36" }, { "url": "http://public2.vulnerablecode.io/api/packages/322509?format=api", "purl": "pkg:gem/tzinfo@0.3.37", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.37" }, { "url": "http://public2.vulnerablecode.io/api/packages/322510?format=api", "purl": "pkg:gem/tzinfo@0.3.38", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.38" }, { "url": "http://public2.vulnerablecode.io/api/packages/322511?format=api", "purl": "pkg:gem/tzinfo@0.3.39", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.39" }, { "url": "http://public2.vulnerablecode.io/api/packages/322512?format=api", "purl": "pkg:gem/tzinfo@0.3.40", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.40" }, { "url": "http://public2.vulnerablecode.io/api/packages/322513?format=api", "purl": "pkg:gem/tzinfo@0.3.41", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.41" }, { "url": "http://public2.vulnerablecode.io/api/packages/322514?format=api", "purl": "pkg:gem/tzinfo@0.3.42", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.42" }, { "url": "http://public2.vulnerablecode.io/api/packages/322515?format=api", "purl": "pkg:gem/tzinfo@0.3.43", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.43" }, { "url": "http://public2.vulnerablecode.io/api/packages/322516?format=api", "purl": "pkg:gem/tzinfo@0.3.44", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.44" }, { "url": "http://public2.vulnerablecode.io/api/packages/322517?format=api", "purl": "pkg:gem/tzinfo@0.3.45", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.45" }, { "url": "http://public2.vulnerablecode.io/api/packages/322518?format=api", "purl": "pkg:gem/tzinfo@0.3.46", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.46" }, { "url": "http://public2.vulnerablecode.io/api/packages/322519?format=api", "purl": "pkg:gem/tzinfo@0.3.47", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.47" }, { "url": "http://public2.vulnerablecode.io/api/packages/322520?format=api", "purl": "pkg:gem/tzinfo@0.3.48", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.48" }, { "url": "http://public2.vulnerablecode.io/api/packages/322521?format=api", "purl": "pkg:gem/tzinfo@0.3.49", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/322522?format=api", "purl": "pkg:gem/tzinfo@0.3.50", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.50" }, { "url": "http://public2.vulnerablecode.io/api/packages/322523?format=api", "purl": "pkg:gem/tzinfo@0.3.51", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.51" }, { "url": "http://public2.vulnerablecode.io/api/packages/322524?format=api", "purl": "pkg:gem/tzinfo@0.3.52", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.52" }, { "url": "http://public2.vulnerablecode.io/api/packages/322525?format=api", "purl": "pkg:gem/tzinfo@0.3.53", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.53" }, { "url": "http://public2.vulnerablecode.io/api/packages/322526?format=api", "purl": "pkg:gem/tzinfo@0.3.54", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.54" }, { "url": "http://public2.vulnerablecode.io/api/packages/322527?format=api", "purl": "pkg:gem/tzinfo@0.3.55", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.55" }, { "url": "http://public2.vulnerablecode.io/api/packages/322528?format=api", "purl": "pkg:gem/tzinfo@0.3.56", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.56" }, { "url": "http://public2.vulnerablecode.io/api/packages/322529?format=api", "purl": "pkg:gem/tzinfo@0.3.57", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.57" }, { "url": "http://public2.vulnerablecode.io/api/packages/322530?format=api", "purl": "pkg:gem/tzinfo@0.3.58", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.58" }, { "url": "http://public2.vulnerablecode.io/api/packages/322531?format=api", "purl": "pkg:gem/tzinfo@0.3.59", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.59" }, { "url": "http://public2.vulnerablecode.io/api/packages/322532?format=api", "purl": "pkg:gem/tzinfo@0.3.60", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.3.60" }, { "url": "http://public2.vulnerablecode.io/api/packages/130848?format=api", "purl": "pkg:gem/tzinfo@0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/144225?format=api", "purl": "pkg:gem/tzinfo@1.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322533?format=api", "purl": "pkg:gem/tzinfo@1.0.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322534?format=api", "purl": "pkg:gem/tzinfo@1.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.1.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322535?format=api", "purl": "pkg:gem/tzinfo@1.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322536?format=api", "purl": "pkg:gem/tzinfo@1.2.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/322537?format=api", "purl": "pkg:gem/tzinfo@1.2.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/322538?format=api", "purl": "pkg:gem/tzinfo@1.2.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/322539?format=api", "purl": "pkg:gem/tzinfo@1.2.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/322540?format=api", "purl": "pkg:gem/tzinfo@1.2.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.5" }, { "url": "http://public2.vulnerablecode.io/api/packages/322541?format=api", "purl": "pkg:gem/tzinfo@1.2.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/322542?format=api", "purl": "pkg:gem/tzinfo@1.2.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/322543?format=api", "purl": "pkg:gem/tzinfo@1.2.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/322544?format=api", "purl": "pkg:gem/tzinfo@1.2.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/tzinfo@1.2.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/98101?format=api", "purl": "pkg:rpm/redhat/rubygem-tzinfo@1.2.10-1?arch=el7rhgs", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo@1.2.10-1%3Farch=el7rhgs" }, { "url": "http://public2.vulnerablecode.io/api/packages/98102?format=api", "purl": "pkg:rpm/redhat/rubygem-tzinfo@1.2.10-1?arch=el8sat", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo@1.2.10-1%3Farch=el8sat" }, { "url": "http://public2.vulnerablecode.io/api/packages/96429?format=api", "purl": "pkg:rpm/redhat/rubygem-tzinfo@2.0.5-1?arch=el8sat", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2cup-9gdn-yyhk" }, { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-tzinfo@2.0.5-1%3Farch=el8sat" }, { "url": "http://public2.vulnerablecode.io/api/packages/98100?format=api", "purl": "pkg:rpm/redhat/tfm-rubygem-tzinfo@1.2.10-1?arch=el7sat", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-kkef-q9fm-xuhw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tfm-rubygem-tzinfo@1.2.10-1%3Farch=el7sat" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31163.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89774", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89758", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89747", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05032", "scoring_system": "epss", "scoring_elements": "0.89756", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/tzinfo/CVE-2022-31163.yml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/tzinfo/CVE-2022-31163.yml" }, { "reference_url": "https://github.com/tzinfo/tzinfo", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/tzinfo/tzinfo" }, { "reference_url": "https://github.com/tzinfo/tzinfo/commit/9905ca93abf7bf3e387bd592406e403cd18334c7", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-05T14:09:24Z/" } ], "url": "https://github.com/tzinfo/tzinfo/commit/9905ca93abf7bf3e387bd592406e403cd18334c7" }, { "reference_url": "https://github.com/tzinfo/tzinfo/commit/9eddbb5c0e682736f61d0dd803b6031a5db9eadf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-05T14:09:24Z/" } ], "url": "https://github.com/tzinfo/tzinfo/commit/9eddbb5c0e682736f61d0dd803b6031a5db9eadf" }, { "reference_url": "https://github.com/tzinfo/tzinfo/commit/ca29f349856d62cb2b2edb3257d9ddd2f97b3c27", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/tzinfo/tzinfo/commit/ca29f349856d62cb2b2edb3257d9ddd2f97b3c27" }, { "reference_url": "https://github.com/tzinfo/tzinfo/releases/tag/v0.3.61", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-05T14:09:24Z/" } ], "url": "https://github.com/tzinfo/tzinfo/releases/tag/v0.3.61" }, { "reference_url": "https://github.com/tzinfo/tzinfo/releases/tag/v1.2.10", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-05T14:09:24Z/" } ], "url": "https://github.com/tzinfo/tzinfo/releases/tag/v1.2.10" }, { "reference_url": "https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-05T14:09:24Z/" } ], "url": "https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-05T14:09:24Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00009.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31163", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110551", "reference_id": "2110551", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110551" }, { "reference_url": "https://github.com/advisories/GHSA-5cm2-9h8c-rvfx", "reference_id": "GHSA-5cm2-9h8c-rvfx", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5cm2-9h8c-rvfx" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7242", "reference_id": "RHSA-2022:7242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1486", "reference_id": "RHSA-2023:1486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2097", "reference_id": "RHSA-2023:2097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2097" } ], "weaknesses": [ { "cwe_id": 22, "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "description": "The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory." }, { "cwe_id": 23, "name": "Relative Path Traversal", "description": "The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as .. that can resolve to a location that is outside of that directory." }, { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kkef-q9fm-xuhw" }