File tree Expand file tree Collapse file tree 6 files changed +71
-7
lines changed
Expand file tree Collapse file tree 6 files changed +71
-7
lines changed Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2008-1891
4- url : http://aluigi.altervista.org/adv/webrickcgi-adv.txt
4+ ghsa : rhf2-x48g-5wr7
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2008-1891
56title : Directory traversal vulnerability in WEBrick
67date : 2008-04-15
78description : |
@@ -19,3 +20,13 @@ patched_versions:
1920 - " ~> 1.8.6.230"
2021 - " ~> 1.8.7.22"
2122 - " >= 1.9.0.2"
23+ related :
24+ url :
25+ - https://nvd.nist.gov/vuln/detail/CVE-2008-1891
26+ - https://github.com/ruby/ruby/blob/ruby_1_9_1/ChangeLog
27+ - https://github.com/ruby/ruby/blob/ruby_1_8_7/ChangeLog
28+ - https://github.com/ruby/ruby/blob/ruby_1_8_6/ChangeLog
29+ - https://github.com/ruby/ruby/blob/ruby_1_8_5/ChangeLog
30+ - http://aluigi.altervista.org/adv/webrickcgi-adv.txt
31+ - http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
32+ - https://github.com/advisories/GHSA-rhf2-x48g-5wr7
Original file line number Diff line number Diff line change @@ -18,6 +18,7 @@ patched_versions:
1818related :
1919 url :
2020 - https://www.ruby-lang.org/en/news/2009/06/09/dos-vulnerability-in-bigdecimal
21+ - https://www.ruby-forum.com/t/ruby-1-8-6-pl369-released/169912
2122 - https://nvd.nist.gov/vuln/detail/CVE-2009-1904
2223 - https://github.com/advisories/GHSA-prwc-wj59-8vwr
2324 - http://www.osvdb.org/show/osvdb/55031
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2011-3009
4- url : https://osdir.com/ml/lang-ruby-core/2011-01/msg00917.html
4+ ghsa : mg6g-jwh6-pwjf
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2011-3009
56title :
67 Ruby Properly initialize the random number generator when forking new process
78date : 2011-07-02
@@ -15,3 +16,11 @@ unaffected_versions:
1516 - " >= 1.9.2"
1617patched_versions :
1718 - " >= 1.8.6.114"
19+ related :
20+ url :
21+ - https://nvd.nist.gov/vuln/detail/CVE-2011-3009
22+ - https://bugzilla.redhat.com/show_bug.cgi?id=722415
23+ - http://rhn.redhat.com/errata/RHSA-2012-0070.html
24+ - https://security.snyk.io/vuln/SNYK-ORACLE6-RUBYLIBS-2462477
25+ - http://www.openwall.com/lists/oss-security/2011/07/20/1
26+ - https://github.com/advisories/GHSA-mg6g-jwh6-pwjf
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2015-1855
4- url : https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/
4+ ghsa : 4x8v-74xf-h4g3
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2015-1855
56title : Ruby OpenSSL Hostname Verification
67date : 2015-04-13
78description : |
@@ -11,7 +12,18 @@ description: |
1112 follows more strict behavior, as recommended by these RFCs. In particular,
1213 matching of more than one wildcard per subject/SAN is no-longer allowed. As well,
1314 comparison of these values is now case-insensitive.
15+ cvss_v2 : 4.3
16+ cvss_v3 : 5.9
1417patched_versions :
1518 - " ~> 2.0.0.645"
1619 - " ~> 2.1.6"
1720 - " >= 2.2.2"
21+ related :
22+ url :
23+ - https://nvd.nist.gov/vuln/detail/CVE-2015-1855
24+ - https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability
25+ - https://bugs.ruby-lang.org/issues/9644
26+ - http://www.debian.org/security/2015/dsa-3245
27+ - http://www.debian.org/security/2015/dsa-3246
28+ - http://www.debian.org/security/2015/dsa-3247
29+ - https://github.com/advisories/GHSA-4x8v-74xf-h4g3
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2017-17405
4- url : https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
4+ ghsa : https://github.com/advisories/GHSA-q23r-c9rf-97q3
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2017-17405
56title : Command injection vulnerability in Net::FTP
67date : 2017-12-14
78description : |
@@ -15,8 +16,28 @@ description: |
1516 command execution.
1617
1718 All users running an affected release should upgrade immediately.
19+ cvss_v2 : 9.3
20+ cvss_v3 : 8.8
1821patched_versions :
1922 - " ~> 2.2.9"
2023 - " ~> 2.3.6"
2124 - " ~> 2.4.3"
2225 - " > 2.5.0.preview.1"
26+ related :
27+ url :
28+ - https://nvd.nist.gov/vuln/detail/CVE-2017-17405
29+ - https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released
30+ - https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-3-6-released
31+ - https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-2-9-released
32+ - https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405
33+ - https://www.exploit-db.com/exploits/43381
34+ - https://lists.debian.org/debian-security-announce/2018/msg00188.html
35+ - https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html
36+ - https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html
37+ - https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
38+ - https://access.redhat.com/errata/RHSA-2018:0378
39+ - https://access.redhat.com/errata/RHSA-2018:0583
40+ - https://access.redhat.com/errata/RHSA-2018:0584
41+ - https://access.redhat.com/errata/RHSA-2018:0585
42+ - https://access.redhat.com/errata/RHSA-2019:2806
43+ - https://github.com/advisories/GHSA-q23r-c9rf-97q3
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2020-10933
4- url : https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/
4+ ghsa : g5hm-28jr-53fh
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2020-10933
56title : Heap exposure vulnerability in the socket library
67date : 2020-03-31
78description : |
@@ -17,9 +18,18 @@ description: |
1718
1819 This issue is exploitable only on Linux. This issue had been since Ruby
1920 2.5.0; 2.4 series is not vulnerable.
21+ cvss_v2 : 5.0
22+ cvss_v3 : 5.3
23+ unaffected_versions :
24+ - " ~> 2.4.0"
2025patched_versions :
2126 - " ~> 2.5.8"
2227 - " ~> 2.6.6"
2328 - " >= 2.7.1"
24- unaffected_versions :
25- - " ~> 2.4.0"
29+ related :
30+ url :
31+ - https://nvd.nist.gov/vuln/detail/CVE-2020-10933
32+ - https://lists.debian.org/debian-security-announce/2020/msg00126.html
33+ - https://security.netapp.com/advisory/ntap-20200625-0001
34+ - https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933
35+ - https://github.com/advisories/GHSA-g5hm-28jr-53fh
You can’t perform that action at this time.
0 commit comments