Skip to content

Commit b36b13d

Browse files
committed
update vulnerabilities with cvss_v3 from github
1 parent 815cb9c commit b36b13d

25 files changed

+50
-0
lines changed

gems/actionpack/CVE-2015-7581.yml

+2
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,8 @@ description: |
4646
4747
Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
4848
49+
cvss_v3: 7.5
50+
4951
unaffected_versions:
5052
- "< 4.0.0"
5153
- ">= 5.0.0.beta1"

gems/actionpack/CVE-2016-2098.yml

+2
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ description: |
8080
Thanks to both Tobias Kraze from makandra and joernchen of Phenoelit for
8181
reporting this!
8282
83+
cvss_v3: 7.3
84+
8385
unaffected_versions:
8486
- ">= 5.0.0.beta1"
8587

gems/actionpack/CVE-2020-8264.yml

+2
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ description: |
2929
3030
`config.middleware.delete ActionDispatch::ActionableExceptions`
3131
32+
cvss_v3: 6.1
33+
3234
unaffected_versions:
3335
- "< 6.0.0"
3436

gems/actionpack/CVE-2021-22885.yml

+2
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,8 @@ description: |
5757
end
5858
```
5959
60+
cvss_v3: 7.5
61+
6062
unaffected_versions:
6163
- "< 2.0.0"
6264

gems/actionview/CVE-2016-2097.yml

+2
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,8 @@ description: |
8181
Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this
8282
and working with us in the patch!
8383
84+
cvss_v3: 5.3
85+
8486
unaffected_versions:
8587
- ">= 4.2.0"
8688

gems/actionview/CVE-2019-5418.yml

+2
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,8 @@ description: |
9090
-------
9191
Thanks to John Hawthorn <[email protected]> of GitHub
9292
93+
cvss_v3: 7.5
94+
9395
patched_versions:
9496
- "~> 4.2.11, >= 4.2.11.1"
9597
- "~> 5.0.7, >= 5.0.7.2"

gems/actionview/CVE-2019-5419.yml

+2
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,8 @@ description: |
8787
Thanks to John Hawthorn <[email protected]> of GitHub
8888
8989
90+
cvss_v3: 7.5
91+
9092
patched_versions:
9193
- ">= 6.0.0.beta3"
9294
- "~> 5.2.2, >= 5.2.2.1"

gems/actionview/CVE-2020-5267.yml

+2
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ description: |
6464
end
6565
```
6666
67+
cvss_v3: 4.0
68+
6769
patched_versions:
6870
- "~> 5.2.4, >= 5.2.4.2"
6971
- ">= 6.0.2.2"

gems/activejob/CVE-2018-16476.yml

+2
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ description: |
2525
All users running an affected release should either upgrade or use one of the
2626
workarounds immediately.
2727
28+
cvss_v3: 7.5
29+
2830
unaffected_versions:
2931
- "< 4.2.0"
3032

gems/activerecord/CVE-2016-6317.yml

+2
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,8 @@ description: |
6565
end
6666
```
6767
68+
cvss_v3: 7.5
69+
6870
unaffected_versions:
6971
- "< 4.2.0"
7072
- ">= 5.0.0"

gems/activestorage/CVE-2018-16477.yml

+2
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ description: |
3636
end
3737
```
3838
39+
cvss_v3: 6.5
40+
3941
unaffected_versions:
4042
- "< 5.2.0"
4143

gems/administrate/CVE-2020-5257.yml

+2
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ description: |
1616
Whilst this does have a high-impact, to exploit this you need access to the
1717
Administrate dashboards, which should generally be behind authentication.
1818
19+
cvss_v3: 7.7
20+
1921
patched_versions:
2022
- ">= 0.13.0"
2123

gems/airbrake-ruby/CVE-2019-16060.yml

+2
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ description: |
88
A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered
99
prior to sending to Airbrake. Such data could be user passwords. Therefore, an app
1010
could leak user passwords without knowing it.
11+
cvss_v3: 9.8
12+
1113
unaffected_versions:
1214
- "< 4.2.3"
1315
- "> 4.2.3"

gems/consul/CVE-2019-16377.yml

+2
Original file line numberDiff line numberDiff line change
@@ -11,5 +11,7 @@ description: |
1111
to all power checks in that controller. This can lead to skipped power checks
1212
and hence unauthenticated access to certain controller actions.
1313
14+
cvss_v3: 9.8
15+
1416
patched_versions:
1517
- ">= 1.0.3"

gems/devise/CVE-2019-16109.yml

+2
Original file line numberDiff line numberDiff line change
@@ -9,5 +9,7 @@ description: |
99
confirmation_token, if a database record has a blank value in the confirmation_token column.
1010
However, there is no scenario within Devise itself in which such database records would exist.
1111
12+
cvss_v3: 5.3
13+
1214
patched_versions:
1315
- ">= 4.7.1"

gems/dragonfly/CVE-2021-33564.yml

+2
Original file line numberDiff line numberDiff line change
@@ -12,5 +12,7 @@ description: |
1212
problem occurs because the generate and process features mishandle use of the ImageMagick
1313
convert utility.
1414
15+
cvss_v3: 9.8
16+
1517
patched_versions:
1618
- ">= 1.4.0"

gems/ember-source/CVE-2015-7565.yml

+2
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ description: |
1919
2020
All users running an affected release should either upgrade or use of
2121
the workarounds immediately.
22+
cvss_v3: 6.1
23+
2224
patched_versions:
2325
- ~> 1.11.4
2426
- ~> 1.12.2

gems/excon/CVE-2019-16779.yml

+2
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ description: |-
1515
Users can workaround the problem by disabling persistent connections, though
1616
this may cause performance implications.
1717
18+
cvss_v3: 5.8
19+
1820
patched_versions:
1921
- ">= 0.71.0"
2022

gems/field_test/CVE-2019-13146.yml

+2
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ description: |
1414
1515
landing_page = field_test(:landing_page)
1616
Page.where("key = '#{landing_page}'")
17+
cvss_v3: 5.3
18+
1719
patched_versions:
1820
- ">= 0.3.1"
1921
unaffected_versions:

gems/foreman_fog_proxmox/CVE-2021-20259.yml

+2
Original file line numberDiff line numberDiff line change
@@ -12,5 +12,7 @@ description: |
1212
and integrity as well as system availability. Versions before foreman_fog_proxmox
1313
0.13.1 are affected
1414
15+
cvss_v3: 7.8
16+
1517
patched_versions:
1618
- ">= 0.13.1"

gems/pgsync/CVE-2021-31671.yml

+2
Original file line numberDiff line numberDiff line change
@@ -23,5 +23,7 @@ description: |
2323
2424
This applies to both the `to` and `from` connections.
2525
26+
cvss_v3: 7.5
27+
2628
patched_versions:
2729
- ">= 0.6.7"

gems/rack/CVE-2019-16782.yml

+2
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ description: |-
2727
may be able to perform a timing attack to determine an existing session id
2828
and hijack that session.
2929
30+
cvss_v3: 6.3
31+
3032
patched_versions:
3133
- "~> 1.6.12"
3234
- ">= 2.0.8"

gems/railties/CVE-2019-5420.yml

+2
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ description: |
4141
-------
4242
Thanks to ooooooo_q
4343
44+
cvss_v3: 9.8
45+
4446
unaffected_versions:
4547
- "< 5.2.0"
4648

gems/ruby-saml/CVE-2017-11428.yml

+2
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ description: |
1818
1919
cvss_v2: 6.3
2020

21+
cvss_v3: 7.7
22+
2123
patched_versions:
2224
- ">= 1.7.0"
2325

gems/trestle-auth/CVE-2021-29435.yml

+2
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ description: |
1818
1919
The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
2020
21+
cvss_v3: 8.1
22+
2123
patched_versions:
2224
- ">= 0.4.2"
2325

0 commit comments

Comments
 (0)