Lookup for vulnerable packages by Package URL.

Purlpkg:gem/safemode@1.2.2
Typegem
Namespace
Namesafemode
Version1.2.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.3.3
Latest_non_vulnerable_version1.3.4
Affected_by_vulnerabilities
0
url VCID-6hub-g2ja-afaw
vulnerability_id VCID-6hub-g2ja-afaw
summary
Information disclosure vulnerability
safemode for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
references
0
reference_url http://projects.theforeman.org/issues/14635
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://projects.theforeman.org/issues/14635
1
reference_url http://rubysec.com/advisories/CVE-2016-3693
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://rubysec.com/advisories/CVE-2016-3693
2
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0336
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3693.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3693.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3693
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72571
published_at 2026-04-07T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72659
published_at 2026-04-16T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72617
published_at 2026-04-13T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72627
published_at 2026-04-12T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72645
published_at 2026-04-11T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.72621
published_at 2026-04-09T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.7257
published_at 2026-04-01T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72577
published_at 2026-04-02T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72594
published_at 2026-04-04T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72609
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3693
5
reference_url http://seclists.org/oss-sec/2016/q2/119
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements
url http://seclists.org/oss-sec/2016/q2/119
6
reference_url https://github.com/svenfuchs/safemode
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode
7
reference_url https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f
8
reference_url https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2
9
reference_url http://theforeman.org/security.html#2016-3693
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://theforeman.org/security.html#2016-3693
10
reference_url http://www.openwall.com/lists/oss-security/2016/04/20/8
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/04/20/8
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327471
reference_id 1327471
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327471
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*
13
reference_url http://rubysec.com/advisories/CVE-2016-3693/
reference_id CVE-2016-3693
reference_type
scores
url http://rubysec.com/advisories/CVE-2016-3693/
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3693
reference_id CVE-2016-3693
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-3693
15
reference_url https://github.com/advisories/GHSA-c92m-rrrc-q5wf
reference_id GHSA-c92m-rrrc-q5wf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c92m-rrrc-q5wf
fixed_packages
0
url pkg:gem/safemode@1.2.4
purl pkg:gem/safemode@1.2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6sgh-v5u7-w3h9
1
vulnerability VCID-96hp-qxsu-rqa2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.2.4
aliases CVE-2016-3693, GHSA-c92m-rrrc-q5wf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hub-g2ja-afaw
1
url VCID-6sgh-v5u7-w3h9
vulnerability_id VCID-6sgh-v5u7-w3h9
summary
Safe mode bypassing
Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7540.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7540
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52429
published_at 2026-04-16T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.5239
published_at 2026-04-13T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52404
published_at 2026-04-12T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5242
published_at 2026-04-11T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52371
published_at 2026-04-09T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52375
published_at 2026-04-08T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52322
published_at 2026-04-07T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52357
published_at 2026-04-04T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52286
published_at 2026-04-01T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52329
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7540
2
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml
3
reference_url https://github.com/svenfuchs/safemode
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode
4
reference_url https://github.com/svenfuchs/safemode/pull/23
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/svenfuchs/safemode/pull/23
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473243
reference_id 1473243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1473243
7
reference_url https://github.com/advisories/GHSA-5vx5-9q73-wgp4
reference_id GHSA-5vx5-9q73-wgp4
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5vx5-9q73-wgp4
fixed_packages
0
url pkg:gem/safemode@1.3.2
purl pkg:gem/safemode@1.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6sgh-v5u7-w3h9
1
vulnerability VCID-96hp-qxsu-rqa2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.2
1
url pkg:gem/safemode@1.3.4
purl pkg:gem/safemode@1.3.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.4
aliases CVE-2017-7540, GHSA-5vx5-9q73-wgp4
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6sgh-v5u7-w3h9
2
url VCID-96hp-qxsu-rqa2
vulnerability_id VCID-96hp-qxsu-rqa2
summary
High severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish.

The safemode rubygem, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
references
0
reference_url https://github.com/advisories/GHSA-8474-rc7c-wrhp
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-8474-rc7c-wrhp
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7540
fixed_packages
0
url pkg:gem/safemode@1.3.3
purl pkg:gem/safemode@1.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.3.3
aliases GHSA-8474-rc7c-wrhp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96hp-qxsu-rqa2
3
url VCID-ty6t-p6kh-z7ap
vulnerability_id VCID-ty6t-p6kh-z7ap
summary
Moderate severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish.

The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
references
0
reference_url https://github.com/advisories/GHSA-44vc-fpcg-5cc5
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-44vc-fpcg-5cc5
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3693
reference_id CVE-2016-3693
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-3693
fixed_packages
0
url pkg:gem/safemode@1.2.4
purl pkg:gem/safemode@1.2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6sgh-v5u7-w3h9
1
vulnerability VCID-96hp-qxsu-rqa2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.2.4
aliases GHSA-44vc-fpcg-5cc5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ty6t-p6kh-z7ap
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/safemode@1.2.2