Skip to content

Commit c69d36b

Browse files
committed
Regenerate advisories after title change
1 parent 15f3589 commit c69d36b

File tree

255 files changed

+1393
-2451
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

255 files changed

+1393
-2451
lines changed
Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: advisory
3-
title: ! 'OSVDB-101157: json Gem for Ruby Data Handling Stack Buffer Overflow'
3+
title: 'OSVDB-101157 (json): json Gem for Ruby Data Handling Stack Buffer Overflow'
44
comments: false
55
categories:
66
- json
@@ -10,18 +10,12 @@ advisory:
1010
url: http://osvdb.org/show/osvdb/101157
1111
title: json Gem for Ruby Data Handling Stack Buffer Overflow
1212
date: 2007-05-21
13-
description: ! 'json Gem for Ruby contains an overflow condition that is triggered
14-
as
15-
13+
description: |
14+
json Gem for Ruby contains an overflow condition that is triggered as
1615
user-supplied input is not properly validated when handling specially crafted
17-
1816
data. This may allow a remote attacker to cause a stack-based buffer
19-
2017
overflow, resulting in a denial of service or potentially allowing the
21-
2218
execution of arbitrary code.
23-
24-
'
2519
patched_versions:
26-
- ! '>= 1.1.0'
20+
- ">= 1.1.0"
2721
---
Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: advisory
3-
title: ! 'OSVDB-95668: Builder Gem for Ruby Tag Name Handling Private Method Exposure'
3+
title: 'OSVDB-95668 (builder): Builder Gem for Ruby Tag Name Handling Private Method
4+
Exposure'
45
comments: false
56
categories:
67
- builder
@@ -10,16 +11,11 @@ advisory:
1011
url: http://osvdb.org/show/osvdb/95668
1112
title: Builder Gem for Ruby Tag Name Handling Private Method Exposure
1213
date: 2007-06-15
13-
description: ! 'Builder Gem for Ruby contains a flaw in the handling of tag names.
14-
The issue
15-
14+
description: |
15+
Builder Gem for Ruby contains a flaw in the handling of tag names. The issue
1616
is triggered when the program reads tag names from XML data and then calls a
17-
1817
method with that name. With a specially crafted file, a context-dependent
19-
2018
attacker can call private methods and manipulate data.
21-
22-
'
2319
patched_versions:
24-
- ! '>= 2.1.2'
20+
- ">= 2.1.2"
2521
---
Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: advisory
3-
title: ! 'CVE-2007-6183: Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new()
3+
title: 'CVE-2007-6183 (gtk2): Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new()
44
Function Format String'
55
comments: false
66
categories:
@@ -13,16 +13,12 @@ advisory:
1313
title: Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new() Function
1414
Format String
1515
date: 2007-11-27
16-
description: ! 'Format string vulnerability in the mdiag_initialize function in
17-
16+
description: |
17+
Format string vulnerability in the mdiag_initialize function in
1818
gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and
19-
2019
SVN versions before 20071127, allows context-dependent attackers to execute
21-
2220
arbitrary code via format string specifiers in the message parameter.
23-
24-
'
2521
cvss_v2: 6.8
2622
patched_versions:
27-
- ! '> 0.16.0'
23+
- "> 0.16.0"
2824
---
Lines changed: 7 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,8 @@
11
---
22
layout: advisory
3-
title: ! 'CVE-2008-7311: Spree Hardcoded config.action_controller_session Hash Value
4-
Cryptographic
5-
3+
title: |
4+
CVE-2008-7311 (spree): Spree Hardcoded config.action_controller_session Hash Value Cryptographic
65
Protection Weakness
7-
8-
'
96
comments: false
107
categories:
118
- spree
@@ -14,20 +11,15 @@ advisory:
1411
cve: 2008-7311
1512
osvdb: 81506
1613
url: https://spreecommerce.com/blog/security-vulernability-session-cookie-store
17-
title: ! 'Spree Hardcoded config.action_controller_session Hash Value Cryptographic
18-
14+
title: |
15+
Spree Hardcoded config.action_controller_session Hash Value Cryptographic
1916
Protection Weakness
20-
21-
'
2217
date: 2008-08-12
23-
description: ! 'Spree contains a hardcoded flaw related to the
24-
18+
description: |
19+
Spree contains a hardcoded flaw related to the
2520
config.action_controller_session hash value. This may allow an attacker to
26-
2721
more easily bypass cryptographic protection.
28-
29-
'
3022
cvss_v2: 5.0
3123
patched_versions:
32-
- ! '>= 0.3.0'
24+
- ">= 0.3.0"
3325
---
Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: advisory
3-
title: ! 'OSVDB-95749: activeresource Gem for Ruby lib/active_resource/connection.rb
3+
title: 'OSVDB-95749 (activeresource): activeresource Gem for Ruby lib/active_resource/connection.rb
44
request Function Multiple Variable Format String'
55
comments: false
66
categories:
@@ -12,20 +12,13 @@ advisory:
1212
title: activeresource Gem for Ruby lib/active_resource/connection.rb request Function
1313
Multiple Variable Format String
1414
date: 2008-08-15
15-
description: ! 'activeresource contains a format string flaw in the request function
16-
of
17-
15+
description: |
16+
activeresource contains a format string flaw in the request function of
1817
lib/active_resource/connection.rb. The issue is triggered as format string
19-
2018
specifiers (e.g. %s and %x) are not properly sanitized in user-supplied input
21-
22-
when passed via the ''result.code'' and ''result.message'' variables. This may
23-
19+
when passed via the 'result.code' and 'result.message' variables. This may
2420
allow a remote attacker to cause a denial of service or potentially execute
25-
2621
arbitrary code.
27-
28-
'
2922
patched_versions:
30-
- ! '>= 2.2.0'
23+
- ">= 2.2.0"
3124
---
Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
---
22
layout: advisory
3-
title: ! 'CVE-2008-7310: Spree Hash Restriction Weakness URL Parsing Order State Value
4-
Manipulation
5-
6-
'
3+
title: |
4+
CVE-2008-7310 (spree): Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation
75
comments: false
86
categories:
97
- spree
@@ -12,17 +10,13 @@ advisory:
1210
cve: 2008-7310
1311
osvdb: 81505
1412
url: https://spreecommerce.com/blog/security-vulnerability-mass-assignment
15-
title: ! 'Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation
16-
17-
'
13+
title: |
14+
Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation
1815
date: 2008-09-22
19-
description: ! 'Spree contains a hash restriction weakness that occurs when parsing
20-
a
21-
16+
description: |
17+
Spree contains a hash restriction weakness that occurs when parsing a
2218
modified URL. This may allow an attacker to manipulate order state values.
23-
24-
'
2519
cvss_v2: 5.0
2620
patched_versions:
27-
- ! '>= 0.3.0'
21+
- ">= 0.3.0"
2822
---
Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: ! 'OSVDB-95376: Oracle "enhanced" ActiveRecord Gem for Ruby :limit / :offset
4-
SQL Injection'
3+
title: 'OSVDB-95376 (activerecord-oracle_enhanced-adapter): Oracle "enhanced" ActiveRecord
4+
Gem for Ruby :limit / :offset SQL Injection'
55
comments: false
66
categories:
77
- activerecord-oracle_enhanced-adapter
@@ -11,20 +11,13 @@ advisory:
1111
url: http://osvdb.org/show/osvdb/95376
1212
title: Oracle "enhanced" ActiveRecord Gem for Ruby :limit / :offset SQL Injection
1313
date: 2008-10-10
14-
description: ! 'Oracle "enhanced" ActiveRecord Gem for Ruby contains a flaw that
15-
may allow an
16-
14+
description: |
15+
Oracle "enhanced" ActiveRecord Gem for Ruby contains a flaw that may allow an
1716
attacker to carry out an SQL injection attack. The issue is due to the
18-
1917
program not properly sanitizing user-supplied input related to the :limit and
20-
2118
:offset functions. This may allow an attacker to inject or manipulate SQL
22-
2319
queries in the back-end database, allowing for the manipulation or disclosure
24-
2520
of arbitrary data.
26-
27-
'
2821
patched_versions:
29-
- ! '>= 1.1.8'
22+
- ">= 1.1.8"
3023
---
Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: ! 'CVE-2009-4123: jruby-openssl Gem for JRuby fails to do proper certificate
4-
validation'
3+
title: 'CVE-2009-4123 (jruby-openssl): jruby-openssl Gem for JRuby fails to do proper
4+
certificate validation'
55
comments: false
66
categories:
77
- jruby-openssl
@@ -12,20 +12,13 @@ advisory:
1212
url: http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl
1313
title: jruby-openssl Gem for JRuby fails to do proper certificate validation
1414
date: 2009-12-07
15-
description: ! 'A security problem involving peer certificate verification was found
16-
where
17-
15+
description: |
16+
A security problem involving peer certificate verification was found where
1817
failed verification silently did nothing, making affected applications
19-
2018
vulnerable to attackers. Attackers could lead a client application to believe
21-
2219
that a secure connection to a rogue SSL server is legitimate. Attackers could
23-
2420
also penetrate client-validated SSL server applications with a dummy
25-
2621
certificate.
27-
28-
'
2922
patched_versions:
30-
- ! '>= 0.6'
23+
- ">= 0.6"
3124
---
Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: advisory
3-
title: ! 'OSVDB-62067: bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII
3+
title: 'OSVDB-62067 (bcrypt): bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII
44
characters (JRuby only)'
55
comments: false
66
categories:
@@ -13,21 +13,14 @@ advisory:
1313
title: bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII characters (JRuby
1414
only)
1515
date: 2010-02-01
16-
description: ! 'bcrypt-ruby Gem for Ruby suffered from a bug related to character
17-
16+
description: |
17+
bcrypt-ruby Gem for Ruby suffered from a bug related to character
1818
encoding that substantially reduced the entropy of hashed passwords
19-
2019
containing non US-ASCII characters. An incorrect encoding step
21-
22-
transparently replaced such characters by ''?'' prior to hashing. In the
23-
20+
transparently replaced such characters by '?' prior to hashing. In the
2421
worst case of a password consisting solely of non-US-ASCII characters,
25-
2622
this would cause its hash to be equivalent to all other such passwords
27-
2823
of the same length. This issue only affects the JRuby implementation.
29-
30-
'
3124
patched_versions:
32-
- ! '>= 2.1.4'
25+
- ">= 2.1.4"
3326
---
Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: advisory
3-
title: ! 'OSVDB-114600: curb Gem for Ruby Empty http_put Body Handling Remote DoS'
3+
title: 'OSVDB-114600 (curb): curb Gem for Ruby Empty http_put Body Handling Remote
4+
DoS'
45
comments: false
56
categories:
67
- curb
@@ -10,14 +11,10 @@ advisory:
1011
url: http://osvdb.org/show/osvdb/114600
1112
title: curb Gem for Ruby Empty http_put Body Handling Remote DoS
1213
date: 2010-08-12
13-
description: ! 'curb Gem for Ruby contains a flaw that is triggered when handling
14-
an empty
15-
14+
description: |
15+
curb Gem for Ruby contains a flaw that is triggered when handling an empty
1616
http_put body. This may allow a remote attacker to crash an application
17-
1817
linked against the library.
19-
20-
'
2118
patched_versions:
22-
- ! '>= 0.7.8'
19+
- ">= 0.7.8"
2320
---

0 commit comments

Comments
 (0)