You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 8, 2022. It is now read-only.
Yep thanks. I actually saw this. This project was something I did for a hackathon and I'm not using it.
I guess it would leave any project created with this open to hacking by the dictionary API that this project uses. It would seem strange for an API provider to try and hack their clients.
I'm not sure what to do about this. I doubt anyone else is using this project and it seems like a small attack vector.
I'm wondering if the responsible thing is just to remove this project.
I didn't personally discover it, but I found it linked from ruby-doc.org (which just parses the recent CVEs that match 'ruby'). I thought I should bring it up, however you already knew about it. 😄
FYI: http://web.nvd.nist.gov/view/vuln/detail;jsessionid=B4DFCF50F8D8A5A4B26BA155FE0156D9?vulnId=CVE-2013-1911
The text was updated successfully, but these errors were encountered: