File tree Expand file tree Collapse file tree 6 files changed +86
-0
lines changed Expand file tree Collapse file tree 6 files changed +86
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : facter
3
+ cve : 2015-1426
4
+ ghsa : j436-h7hm-rx46
5
+ url : https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata
6
+ title : Puppet Labs Facter allows local users to obtains sensitive Amazon
7
+ EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.
8
+ date : 2015-02-10
9
+ description : |
10
+ Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to
11
+ obtains sensitive Amazon EC2 IAM instance metadata by reading
12
+ a fact for an Amazon EC2 node.
13
+ cvss_v2 : 2.1
14
+ cvss_v3 : 1.3
15
+ unaffected_versions :
16
+ - " < 1.6.0"
17
+ patched_versions :
18
+ - " >= 2.4.1"
19
+ related :
20
+ url :
21
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-1426
22
+ - https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata
23
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/disclosure-amazon-ec2-iam-instance/ruby/sid-1508/summary
24
+ - https://srcclr.com/security/disclosure-amazon-ec2-iam-instance/ruby/s-1508
25
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
26
+ - https://github.com/advisories/GHSA-j436-h7hm-rx46
Original file line number Diff line number Diff line change @@ -15,3 +15,7 @@ cvss_v2: 1.9
15
15
patched_versions :
16
16
- " ~> 0.3.17"
17
17
- " >= 0.5.2"
18
+ related :
19
+ url :
20
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
21
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/world-readable-permissions-as-default/ruby/sid-740/summary
Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : logstash-core
3
+ cve : 2015-5378
4
+ ghsa : g6rc-3fpq-w2gr
5
+ url : https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html
6
+ title : " Logstash: SSL/TLS FREAK Attack"
7
+ date : 2015-07-21
8
+ description : |
9
+ Logstash: SSL/TLS FREAK Attack: Logstash 1.5.x before 1.5.3 and
10
+ 1.4.x before 1.4.4 allows remote attackers to read communications
11
+ between Logstash Forwarder agent and Logstash server.
12
+ cvss_v2 : 5.0
13
+ cvss_v3 : 7.5
14
+ patched_versions :
15
+ - " ~> 1.4.4"
16
+ - " >= 1.5.3"
17
+ related :
18
+ url :
19
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-5378
20
+ - https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html
21
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/factoring-attack-rsa-export-keys-freak/ruby/sid-1745/summary
22
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
23
+ - https://www.elastic.co/community/security
24
+ - https://github.com/advisories/GHSA-g6rc-3fpq-w2gr
25
+ - https://web.archive.org/web/20181211080524/http://www.securityfocus.com/bid/76015
Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : logstash-core
3
+ cve : 2015-5619
4
+ ghsa : 68pf-743m-hv2w
5
+ url : https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released
6
+ title : " Logstash: Man-In-The Middle attack"
7
+ date : 2015-08-20
8
+ description : |
9
+ Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack
10
+ output or the Logstash forwarder does not validate SSL/TLS certificates
11
+ from the Logstash server, which might allow attackers to obtain
12
+ sensitive information via a man-in-the-middle attack.
13
+ cvss_v2 : 4.3
14
+ cvss_v3 : 5.9
15
+ patched_versions :
16
+ - " ~> 1.4.5"
17
+ - " >= 1.5.4"
18
+ related :
19
+ url :
20
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-5619
21
+ - https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released
22
+ - https://www.elastic.co/community/security
23
+ - https://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html
24
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/man-middle-mitm-attacks/ruby/sid-1798/summary
25
+ - https://github.com/advisories/GHSA-68pf-743m-hv2w
Original file line number Diff line number Diff line change @@ -26,3 +26,5 @@ related:
26
26
- http://secunia.com/advisories/59197
27
27
- http://secunia.com/advisories/59200
28
28
- http://www.securityfocus.com/bid/68035
29
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
30
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/elevation-privileges-untrusted-search/ruby/sid-1586/summary
Original file line number Diff line number Diff line change @@ -12,3 +12,7 @@ description: |
12
12
cvss_v3 : 8.8
13
13
patched_versions :
14
14
- " >= 0.6.29"
15
+ related :
16
+ url :
17
+ - https://sca.analysiscenter.veracode.com/vulnerability-database/security/cross-site-request-forgery-csrf/ruby/sid-1686/summary
18
+ - https://github.com/rubysec/ruby-advisory-db/issues/238
You can’t perform that action at this time.
0 commit comments