Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-6sgh-v5u7-w3h9 |
| Summary | Safe mode bypassing
Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-5vx5-9q73-wgp4 |
|
|
| Fixed_packages |
|
| Affected_packages |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7540 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52429 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.5242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52371 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52286 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52329 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7540 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
184 |
| name |
Incomplete List of Disallowed Inputs |
| description |
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses. |
|
|
| Exploits |
|
| Severity_range_score | 7.5 - 10.0 |
| Exploitability | 0.5 |
| Weighted_severity | 9.0 |
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgh-v5u7-w3h9 |