File tree Expand file tree Collapse file tree 5 files changed +50
-4
lines changed Expand file tree Collapse file tree 5 files changed +50
-4
lines changed Original file line number Diff line number Diff line change 1
1
---
2
2
gem : git
3
3
cve : 2022-46648
4
+ ghsa : pfpr-3463-c6jh
4
5
url : https://github.com/ruby-git/ruby-git/pull/602
5
6
title : Potential remote code execution in ruby-git
6
7
date : 2023-01-05
@@ -15,10 +16,10 @@ description: |
15
16
remote code execution. Version 1.13.0 of the git gem was released which
16
17
correctly parses any quoted file names.
17
18
cvss_v3 : 5.5
18
- patched_versions :
19
- - ' >= 1.13.0'
20
19
unaffected_versions :
21
- - ' < 1.2.0'
20
+ - " < 1.2.0"
21
+ patched_versions :
22
+ - " >= 1.13.0"
22
23
related :
23
24
url :
24
- - https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0
25
+ - https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0
Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : inline_svg
3
+ cve : 2020-36644
4
+ ghsa : p33q-4h4m-j994
5
+ url : https://github.com/jamesmartin/inline_svg/pull/117
6
+ title : Inline SVG vulnerable to Cross-site Scripting
7
+ date : 2023-01-07
8
+ description : |
9
+ A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1
10
+ and classified as problematic. Affected by this vulnerability is an unknown functionality
11
+ of the file `lib/inline_svg/action_view/helpers.rb` of the component `URL Parameter
12
+ Handler`. The manipulation of the argument filename leads to cross site scripting.
13
+ The attack can be launched remotely. Upgrading to version 1.7.2 is able to address
14
+ this issue. The name of the patch is f5363b351508486021f99e083c92068cf2943621. It
15
+ is recommended to upgrade the affected component. The identifier VDB-217597 was
16
+ assigned to this vulnerability.
17
+ patched_versions :
18
+ - " >= 1.7.2"
19
+ related :
20
+ url :
21
+ - https://github.com/jamesmartin/inline_svg/commit/f5363b351508486021f99e083c92068cf2943621
22
+ - https://github.com/jamesmartin/inline_svg/releases/tag/v1.7.2
23
+ - https://vuldb.com/?id.217597
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ description: |
13
13
this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It
14
14
is recommended to upgrade the affected component. VDB-217142 is the identifier assigned
15
15
to this vulnerability.
16
+ cvss_v3 : 6.1
16
17
patched_versions :
17
18
- " >= 1.0.0"
18
19
related :
Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : oxidized-web
3
+ cve : 2019-25088
4
+ ghsa : 8qwh-rm6c-jv96
5
+ url : https://github.com/ytti/oxidized-web/pull/195
6
+ title : Oxidized Web vulnerable to Cross-site Scripting
7
+ date : 2022-12-27
8
+ description : |
9
+ A vulnerability was found in ytti Oxidized Web. It has been classified
10
+ as problematic. Affected is an unknown function of the file `lib/oxidized/web/views/conf_search.haml`.
11
+ The manipulation of the argument `to_research` leads to cross site scripting. It
12
+ is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45.
13
+ It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier
14
+ assigned to this vulnerability.
15
+ cvss_v3 : 5.4
16
+ related :
17
+ url :
18
+ - https://github.com/ytti/oxidized-web/commit/55ab9bdc68b03ebce9280b8746ef31d7fdedcc45
19
+ - https://vuldb.com/?id.216870
Original file line number Diff line number Diff line change 1
1
---
2
2
gem : pghero
3
3
cve : 2023-22626
4
+ ghsa : vf99-xw26-86g5
4
5
url : https://github.com/ankane/pghero/issues/439
5
6
title : Information Disclosure Through EXPLAIN Feature
6
7
date : 2023-01-04
@@ -10,5 +11,6 @@ description: |
10
11
appear in an error message. If the PgHero database user has superuser privileges
11
12
(not recommended), the user can use file access functions to read files on the
12
13
database server.
14
+ cvss_v3 : 7.5
13
15
patched_versions :
14
16
- " >= 3.1.0"
You can’t perform that action at this time.
0 commit comments