{"id":"CVE-2015-4410","details":"The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.","aliases":["GHSA-f93j-hmcr-jcwh"],"modified":"2026-01-27T04:15:02.766062Z","published":"2020-02-20T17:15:12Z","withdrawn":"2026-01-27T04:15:02.766062Z","related":["SUSE-SU-2016:2019-1"],"references":[{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/06/06/3"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/75045"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1229757"},{"type":"EVIDENCE","url":"https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html"},{"type":"EVIDENCE","url":"https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2015/q2/653"},{"type":"ADVISORY","url":"https://www.securityfocus.com/bid/75045"},{"type":"EVIDENCE","url":"https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}