Filtered by vendor Private Address Check Project
Subscribe
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-3759 | 1 Private Address Check Project | 1 Private Address Check | 2024-11-21 | 4.3 MEDIUM | 3.7 LOW |
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address. | |||||
CVE-2017-0909 | 1 Private Address Check Project | 1 Private Address Check | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery. | |||||
CVE-2017-0904 | 1 Private Address Check Project | 1 Private Address Check | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery. |