|
5 | 5 | ],
|
6 | 6 | "check_name": "Insecure Dependency",
|
7 | 7 | "content": {
|
8 |
| - "body": "**Advisory**: CVE-2016-0751\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
| 8 | + "body": "**Advisory**: CVE-2016-0751\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
9 | 9 | },
|
10 | 10 | "description": "Possible Object Leak and Denial of Service attack in Action Pack",
|
11 | 11 | "fingerprint": "fb0889d061f06c4203ed27b43aca68b2",
|
|
110 | 110 | ],
|
111 | 111 | "check_name": "Insecure Dependency",
|
112 | 112 | "content": {
|
113 |
| - "body": "**Advisory**: CVE-2016-0752\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
| 113 | + "body": "**Advisory**: CVE-2016-0752\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
114 | 114 | },
|
115 | 115 | "description": "Possible Information Leak Vulnerability in Action View",
|
116 | 116 | "fingerprint": "f26c202060c497fd32f90c538c543445",
|
|
131 | 131 | ],
|
132 | 132 | "check_name": "Insecure Dependency",
|
133 | 133 | "content": {
|
134 |
| - "body": "**Advisory**: CVE-2016-0753\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
| 134 | + "body": "**Advisory**: CVE-2016-0753\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14" |
135 | 135 | },
|
136 | 136 | "description": "Possible Input Validation Circumvention in Active Model",
|
137 | 137 | "fingerprint": "723fd12f6da25240ffbf2f3312b8e33d",
|
|
152 | 152 | ],
|
153 | 153 | "check_name": "Insecure Dependency",
|
154 | 154 | "content": {
|
155 |
| - "body": "**Advisory**: CVE-2015-7577\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
| 155 | + "body": "**Advisory**: CVE-2015-7577\n\n**Criticality**: Medium\n\n**URL**: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g\n\n**Solution**: upgrade to >= 5.0.0.beta1.1, >= 4.2.5.1, ~> 4.2.5, >= 4.1.14.1, ~> 4.1.14, ~> 3.2.22.1" |
156 | 156 | },
|
157 | 157 | "description": "Nested attributes rejection proc bypass in Active Record",
|
158 | 158 | "fingerprint": "2441a69a4af613e9235af4024ff21b30",
|
|
0 commit comments