Skip to content

Commit 74af852

Browse files
jasnowpostmodern
authored andcommitted
9 modified files from github_advisory_sync.rb script (2007-2011)
1 parent 1057649 commit 74af852

File tree

9 files changed

+31
-21
lines changed

9 files changed

+31
-21
lines changed

gems/actionpack/CVE-2011-3186.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ gem: actionpack
33
framework: rails
44
cve: 2011-3186
55
osvdb: 74616
6+
ghsa: fcqf-h4h4-695m
67
url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g
78
title: Response Splitting Vulnerability in Ruby on Rails
89
date: 2011-08-16
@@ -12,4 +13,4 @@ description: |
1213
insufficient sanitization of the values provided for response content types.
1314
cvss_v2: 4.3
1415
patched_versions:
15-
- '>= 2.3.13'
16+
- ">= 2.3.13"

gems/gtk2/CVE-2007-6183.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,15 @@
22
gem: gtk2
33
cve: 2007-6183
44
osvdb: 40774
5+
ghsa: xgj6-pgrm-x4r2
56
url: https://nvd.nist.gov/vuln/detail/CVE-2007-6183
67
title: 'CVE-2007-6183 ruby-gnome2: format string vulnerability'
78
date: 2007-11-27
8-
description: Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c
9+
description: |
10+
Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c
911
in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows
1012
context-dependent attackers to execute arbitrary code via format string specifiers
1113
in the message parameter.
1214
cvss_v2: 6.8
1315
patched_versions:
14-
- '> 0.16.0'
16+
- "> 0.16.0"

gems/jruby-openssl/CVE-2009-4123.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
gem: jruby-openssl
33
platform: jruby
44
cve: 2009-4123
5+
ghsa: xgv7-pqqh-h2w9
56
url: http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl
67
title: jruby-openssl Gem for JRuby fails to do proper certificate validation
78
date: 2009-12-07
@@ -13,4 +14,4 @@ description: |
1314
also penetrate client-validated SSL server applications with a dummy
1415
certificate.
1516
patched_versions:
16-
- '>= 0.6'
17+
- ">= 0.6"

gems/mail/CVE-2011-0739.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
gem: mail
33
cve: 2011-0739
44
osvdb: 70667
5+
ghsa: cpjc-p7fc-j9xh
56
url: https://nvd.nist.gov/vuln/detail/CVE-2011-0739
6-
title: >
7+
title: |
78
Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From:
89
Address Arbitrary Shell Command Injection
910
date: 2011-01-25
@@ -15,4 +16,4 @@ description: |
1516
shell commands.
1617
cvss_v2: 6.8
1718
patched_versions:
18-
- '>= 2.2.15'
19+
- ">= 2.2.15"

gems/rack/CVE-2011-5036.yml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,18 @@
22
gem: rack
33
cve: 2011-5036
44
osvdb: 78121
5+
ghsa: v6j3-7jrw-hq2p
56
url: https://nvd.nist.gov/vuln/detail/CVE-2011-5036
67
title: 'CVE-2011-5036 rubygem-rack: hash table collisions DoS (oCERT-2011-003)'
78
date: 2011-12-28
8-
description: Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes
9+
description: |
10+
Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes
911
hash values for form parameters without restricting the ability to trigger hash
1012
collisions predictably, which allows remote attackers to cause a denial of service
1113
(CPU consumption) by sending many crafted parameters.
1214
cvss_v2: 5.0
1315
patched_versions:
14-
- ~> 1.1.3
15-
- ~> 1.2.5
16-
- ~> 1.3.6
17-
- '>= 1.4.0'
16+
- "~> 1.1.3"
17+
- "~> 1.2.5"
18+
- "~> 1.3.6"
19+
- ">= 1.4.0"

gems/rubygems-update/CVE-2007-0469.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,15 @@ gem: rubygems-update
33
library: rubygems
44
cve: 2007-0469
55
osvdb: 33561
6+
ghsa: 95vx-q4c2-64gr
67
url: https://nvd.nist.gov/vuln/detail/CVE-2007-0469
7-
title: 'CVE-2007-0469 RubyGems: Specially-crafted Gem archive can overwrite system
8-
files'
8+
title: 'CVE-2007-0469 RubyGems: Specially-crafted Gem archive can overwrite system files'
99
date: 2007-01-22
10-
description: The extract_files function in installer.rb in RubyGems before 0.9.1 does
10+
description: |
11+
The extract_files function in installer.rb in RubyGems before 0.9.1 does
1112
not check whether files exist before overwriting them, which allows user-assisted
1213
remote attackers to overwrite arbitrary files, cause a denial of service, or execute
1314
arbitrary code via crafted GEM packages.
1415
cvss_v2: 9.3
1516
patched_versions:
16-
- '>= 0.9.1'
17+
- ">= 0.9.1"

gems/spree/CVE-2008-7310.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
gem: spree
33
cve: 2008-7310
44
osvdb: 81505
5+
ghsa: 7h48-m3rw-vr27
56
url: https://spreecommerce.com/blog/security-vulnerability-mass-assignment
6-
title: |
7-
Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation
7+
title: 'Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation'
88
date: 2008-09-22
99
description: |
1010
Spree contains a hash restriction weakness that occurs when parsing a
1111
modified URL. This may allow an attacker to manipulate order state values.
1212
cvss_v2: 5.0
1313
patched_versions:
14-
- '>= 0.3.0'
14+
- ">= 0.3.0"

gems/spree/CVE-2008-7311.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
gem: spree
33
cve: 2008-7311
44
osvdb: 81506
5+
ghsa: g466-57gh-cqfw
56
url: https://spreecommerce.com/blog/security-vulernability-session-cookie-store
67
title: |
78
Spree Hardcoded config.action_controller_session Hash Value Cryptographic
@@ -13,4 +14,4 @@ description: |
1314
more easily bypass cryptographic protection.
1415
cvss_v2: 5.0
1516
patched_versions:
16-
- '>= 0.3.0'
17+
- ">= 0.3.0"

gems/spree/CVE-2010-3978.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
gem: spree
33
cve: 2010-3978
44
osvdb: 69098
5+
ghsa: hwrx-wc75-mgh7
56
url: https://spreecommerce.com/blog/json-hijacking-vulnerability
67
title: |
78
Spree Multiple Script JSON Request Validation Weakness Remote Information
@@ -15,5 +16,5 @@ description: |
1516
user visits a crafted website.
1617
cvss_v2: 5.0
1718
patched_versions:
18-
- ~> 0.11.2
19-
- '>= 0.30.0'
19+
- "~> 0.11.2"
20+
- ">= 0.30.0"

0 commit comments

Comments
 (0)