File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 11---
22gem : git
33cve : 2022-46648
4+ ghsa : pfpr-3463-c6jh
45url : https://github.com/ruby-git/ruby-git/pull/602
56title : Potential remote code execution in ruby-git
67date : 2023-01-05
@@ -15,10 +16,10 @@ description: |
1516 remote code execution. Version 1.13.0 of the git gem was released which
1617 correctly parses any quoted file names.
1718cvss_v3 : 5.5
18- patched_versions :
19- - ' >= 1.13.0'
2019unaffected_versions :
21- - ' < 1.2.0'
20+ - " < 1.2.0"
21+ patched_versions :
22+ - " >= 1.13.0"
2223related :
2324 url :
24- - https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0
25+ - https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0
Original file line number Diff line number Diff line change 1+ ---
2+ gem : inline_svg
3+ cve : 2020-36644
4+ ghsa : p33q-4h4m-j994
5+ url : https://github.com/jamesmartin/inline_svg/pull/117
6+ title : Inline SVG vulnerable to Cross-site Scripting
7+ date : 2023-01-07
8+ description : |
9+ A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1
10+ and classified as problematic. Affected by this vulnerability is an unknown functionality
11+ of the file `lib/inline_svg/action_view/helpers.rb` of the component `URL Parameter
12+ Handler`. The manipulation of the argument filename leads to cross site scripting.
13+ The attack can be launched remotely. Upgrading to version 1.7.2 is able to address
14+ this issue. The name of the patch is f5363b351508486021f99e083c92068cf2943621. It
15+ is recommended to upgrade the affected component. The identifier VDB-217597 was
16+ assigned to this vulnerability.
17+ patched_versions :
18+ - " >= 1.7.2"
19+ related :
20+ url :
21+ - https://github.com/jamesmartin/inline_svg/commit/f5363b351508486021f99e083c92068cf2943621
22+ - https://github.com/jamesmartin/inline_svg/releases/tag/v1.7.2
23+ - https://vuldb.com/?id.217597
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ description: |
1313 this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It
1414 is recommended to upgrade the affected component. VDB-217142 is the identifier assigned
1515 to this vulnerability.
16+ cvss_v3 : 6.1
1617patched_versions :
1718- " >= 1.0.0"
1819related :
Original file line number Diff line number Diff line change 1+ ---
2+ gem : oxidized-web
3+ cve : 2019-25088
4+ ghsa : 8qwh-rm6c-jv96
5+ url : https://github.com/ytti/oxidized-web/pull/195
6+ title : Oxidized Web vulnerable to Cross-site Scripting
7+ date : 2022-12-27
8+ description : |
9+ A vulnerability was found in ytti Oxidized Web. It has been classified
10+ as problematic. Affected is an unknown function of the file `lib/oxidized/web/views/conf_search.haml`.
11+ The manipulation of the argument `to_research` leads to cross site scripting. It
12+ is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45.
13+ It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier
14+ assigned to this vulnerability.
15+ cvss_v3 : 5.4
16+ related :
17+ url :
18+ - https://github.com/ytti/oxidized-web/commit/55ab9bdc68b03ebce9280b8746ef31d7fdedcc45
19+ - https://vuldb.com/?id.216870
Original file line number Diff line number Diff line change 11---
22gem : pghero
33cve : 2023-22626
4+ ghsa : vf99-xw26-86g5
45url : https://github.com/ankane/pghero/issues/439
56title : Information Disclosure Through EXPLAIN Feature
67date : 2023-01-04
@@ -10,5 +11,6 @@ description: |
1011 appear in an error message. If the PgHero database user has superuser privileges
1112 (not recommended), the user can use file access functions to read files on the
1213 database server.
14+ cvss_v3 : 7.5
1315patched_versions :
1416- " >= 3.1.0"
You can’t perform that action at this time.
0 commit comments