Skip to content

Commit db5b9d9

Browse files
committed
Bump database
1 parent e579488 commit db5b9d9

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

DATABASE_VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
Tue Jan 30 11:08:21 EST 2018
1+
Wed Feb 28 10:18:38 EST 2018

spec/fixtures/unpatched_versions/issues.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
],
66
"check_name": "Insecure Dependency",
77
"content": {
8-
"body": "**Advisory**: CVE-2016-0751\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1"
8+
"body": "**Advisory**: CVE-2016-0751\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1"
99
},
1010
"description": "Possible Object Leak and Denial of Service attack in Action Pack",
1111
"fingerprint": "fb0889d061f06c4203ed27b43aca68b2",
@@ -110,7 +110,7 @@
110110
],
111111
"check_name": "Insecure Dependency",
112112
"content": {
113-
"body": "**Advisory**: CVE-2016-0752\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14"
113+
"body": "**Advisory**: CVE-2016-0752\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14"
114114
},
115115
"description": "Possible Information Leak Vulnerability in Action View",
116116
"fingerprint": "f26c202060c497fd32f90c538c543445",
@@ -131,7 +131,7 @@
131131
],
132132
"check_name": "Insecure Dependency",
133133
"content": {
134-
"body": "**Advisory**: CVE-2016-0753\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14"
134+
"body": "**Advisory**: CVE-2016-0753\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14"
135135
},
136136
"description": "Possible Input Validation Circumvention in Active Model",
137137
"fingerprint": "723fd12f6da25240ffbf2f3312b8e33d",
@@ -152,7 +152,7 @@
152152
],
153153
"check_name": "Insecure Dependency",
154154
"content": {
155-
"body": "**Advisory**: CVE-2015-7577\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1"
155+
"body": "**Advisory**: CVE-2015-7577\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1"
156156
},
157157
"description": "Nested attributes rejection proc bypass in Active Record",
158158
"fingerprint": "2441a69a4af613e9235af4024ff21b30",

0 commit comments

Comments
 (0)