5
0
Fork 0
mirror of https://0xacab.org/sutty/sutty synced 2024-07-01 11:16:08 +00:00
panel/Gemfile.lock

831 lines
21 KiB
Plaintext
Raw Normal View History

2019-09-24 17:56:04 +00:00
GIT
remote: https://0xacab.org/sutty/yaml_db.git
revision: 40e44c29ce4290dfe4013ff4fce1be5a936fedf4
specs:
yaml_db (0.7.0)
rails (>= 3.0)
rake (>= 0.8.7)
GIT
remote: https://github.com/fauno/email_address
revision: 536b51f7071b68a55140c0c1726b4cd401d1c04d
branch: i18n
specs:
email_address (0.1.20)
netaddr (>= 2.0.4, < 3)
simpleidn
2022-04-23 21:04:51 +00:00
GIT
remote: https://github.com/fauno/rollup.git
revision: ddbb345aa57e63b4cfdf7557267efa89ba60caac
branch: update
specs:
rollups (0.1.3)
activesupport (>= 5.1)
groupdate (>= 5.2)
2018-01-02 17:19:25 +00:00
GEM
2020-12-29 17:40:27 +00:00
remote: https://gems.sutty.nl/
2018-01-02 17:19:25 +00:00
specs:
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
actioncable (6.1.4.7)
actionpack (= 6.1.4.7)
activesupport (= 6.1.4.7)
2018-01-02 17:19:25 +00:00
nio4r (~> 2.0)
2019-04-08 18:00:42 +00:00
websocket-driver (>= 0.6.1)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
actionmailbox (6.1.4.7)
actionpack (= 6.1.4.7)
activejob (= 6.1.4.7)
activerecord (= 6.1.4.7)
activestorage (= 6.1.4.7)
activesupport (= 6.1.4.7)
2019-08-29 17:54:19 +00:00
mail (>= 2.7.1)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
actionmailer (6.1.4.7)
actionpack (= 6.1.4.7)
actionview (= 6.1.4.7)
activejob (= 6.1.4.7)
activesupport (= 6.1.4.7)
2018-01-02 17:19:25 +00:00
mail (~> 2.5, >= 2.5.4)
rails-dom-testing (~> 2.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
actionpack (6.1.4.7)
actionview (= 6.1.4.7)
activesupport (= 6.1.4.7)
2020-12-24 18:02:03 +00:00
rack (~> 2.0, >= 2.0.9)
2018-01-02 17:19:25 +00:00
rack-test (>= 0.6.3)
rails-dom-testing (~> 2.0)
2019-08-29 17:54:19 +00:00
rails-html-sanitizer (~> 1.0, >= 1.2.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
actiontext (6.1.4.7)
actionpack (= 6.1.4.7)
activerecord (= 6.1.4.7)
activestorage (= 6.1.4.7)
activesupport (= 6.1.4.7)
2019-08-29 17:54:19 +00:00
nokogiri (>= 1.8.5)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
actionview (6.1.4.7)
activesupport (= 6.1.4.7)
2018-01-02 17:19:25 +00:00
builder (~> 3.1)
erubi (~> 1.4)
rails-dom-testing (~> 2.0)
2019-08-29 17:54:19 +00:00
rails-html-sanitizer (~> 1.1, >= 1.2.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
activejob (6.1.4.7)
activesupport (= 6.1.4.7)
2018-01-02 17:19:25 +00:00
globalid (>= 0.3.6)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
activemodel (6.1.4.7)
activesupport (= 6.1.4.7)
activerecord (6.1.4.7)
activemodel (= 6.1.4.7)
activesupport (= 6.1.4.7)
activestorage (6.1.4.7)
actionpack (= 6.1.4.7)
activejob (= 6.1.4.7)
activerecord (= 6.1.4.7)
activesupport (= 6.1.4.7)
2021-03-27 14:25:15 +00:00
marcel (~> 1.0.0)
mini_mime (>= 1.1.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
activesupport (6.1.4.7)
2018-01-02 17:19:25 +00:00
concurrent-ruby (~> 1.0, >= 1.0.2)
2020-12-24 18:02:03 +00:00
i18n (>= 1.6, < 2)
minitest (>= 5.1)
tzinfo (~> 2.0)
zeitwerk (~> 2.3)
addressable (2.8.0)
2019-09-11 16:01:30 +00:00
public_suffix (>= 2.0.2, < 5.0)
2020-09-01 21:52:05 +00:00
adhesiones-jekyll-theme (0.2.1)
jekyll (~> 4.0)
jekyll-data (~> 1.1)
jekyll-feed (~> 0.9)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
jekyll-locales (~> 0.1)
jekyll-relative-urls (~> 0.0)
jekyll-seo-tag (~> 2.1)
2022-04-11 18:39:08 +00:00
ansi (1.5.0)
2021-02-02 22:39:38 +00:00
ast (2.4.2)
2021-09-11 23:17:35 +00:00
autoprefixer-rails (10.3.3.0)
2021-08-28 15:56:04 +00:00
execjs (~> 2)
bcrypt (3.1.16-x86_64-linux-musl)
bcrypt_pbkdf (1.1.0-x86_64-linux-musl)
2021-10-22 20:36:00 +00:00
benchmark-ips (2.9.2)
bindex (0.8.1-x86_64-linux-musl)
blazer (2.6.4)
2020-02-06 17:06:47 +00:00
activerecord (>= 5)
chartkick (>= 3.2)
railties (>= 5)
safely_block (>= 0.1.1)
2021-02-02 22:39:38 +00:00
bootstrap (4.6.0)
2019-07-10 20:01:59 +00:00
autoprefixer-rails (>= 9.1.0)
popper_js (>= 1.14.3, < 2)
sassc-rails (>= 2.0.0)
2021-11-25 12:42:58 +00:00
brakeman (5.1.2)
2022-04-11 18:39:08 +00:00
brotli (0.2.3-x86_64-linux-musl)
builder (3.2.4)
2018-04-16 16:49:51 +00:00
capybara (2.18.0)
2018-01-02 17:19:25 +00:00
addressable
mini_mime (>= 0.1.3)
nokogiri (>= 1.3.3)
rack (>= 1.0.0)
rack-test (>= 0.5.4)
2018-04-16 16:49:51 +00:00
xpath (>= 2.0, < 4.0)
chartkick (4.2.0)
2021-10-22 20:36:00 +00:00
childprocess (4.1.0)
coderay (1.1.3)
2018-01-29 18:09:30 +00:00
colorator (1.1.0)
commonmarker (0.23.5-x86_64-linux-musl)
2021-06-15 20:07:52 +00:00
concurrent-ruby (1.1.9)
concurrent-ruby-ext (1.1.9-x86_64-linux-musl)
concurrent-ruby (= 1.1.9)
2020-03-19 18:46:33 +00:00
crass (1.0.6)
2021-02-11 14:30:59 +00:00
database_cleaner (2.0.1)
2021-02-02 22:39:38 +00:00
database_cleaner-active_record (~> 2.0.0)
2021-05-20 23:32:53 +00:00
database_cleaner-active_record (2.0.1)
2021-02-02 22:39:38 +00:00
activerecord (>= 5.a)
database_cleaner-core (~> 2.0.0)
2021-02-11 14:30:59 +00:00
database_cleaner-core (2.0.1)
2021-11-25 12:42:58 +00:00
dead_end (3.1.0)
derailed_benchmarks (2.1.1)
2020-04-14 22:07:46 +00:00
benchmark-ips (~> 2)
2021-02-02 22:39:38 +00:00
dead_end
2020-04-14 22:07:46 +00:00
get_process_mem (~> 0)
heapy (~> 0)
2021-02-02 22:39:38 +00:00
memory_profiler (>= 0, < 2)
mini_histogram (>= 0.3.0)
2020-04-14 22:07:46 +00:00
rack (>= 1)
2021-02-11 14:30:59 +00:00
rack-test
2020-04-14 22:07:46 +00:00
rake (> 10, < 14)
ruby-statistics (>= 2.1)
thor (>= 0.19, < 2)
2021-05-20 23:32:53 +00:00
devise (4.8.0)
2019-07-03 19:57:16 +00:00
bcrypt (~> 3.0)
orm_adapter (~> 0.1)
2019-08-29 17:54:19 +00:00
railties (>= 4.1.0)
2019-07-03 19:57:16 +00:00
responders
warden (~> 1.2.3)
2021-11-25 12:42:58 +00:00
devise-i18n (1.10.1)
devise (>= 4.8.0)
2021-05-20 23:32:53 +00:00
devise_invitable (2.0.5)
2019-07-05 23:55:59 +00:00
actionmailer (>= 5.0)
devise (>= 4.6)
2020-07-23 23:07:52 +00:00
dotenv (2.7.6)
dotenv-rails (2.7.6)
dotenv (= 2.7.6)
railties (>= 3.2)
2021-10-22 20:36:00 +00:00
down (5.2.4)
2021-08-28 15:56:04 +00:00
addressable (~> 2.8)
ed25519 (1.2.4-x86_64-linux-musl)
2021-05-20 23:32:53 +00:00
editorial-autogestiva-jekyll-theme (0.3.4)
2021-04-14 16:37:56 +00:00
jekyll (~> 4)
jekyll-commonmark (~> 1.3)
jekyll-data (~> 1.1)
2021-04-14 16:37:56 +00:00
jekyll-dotenv (>= 0.2)
jekyll-feed (~> 0.15)
jekyll-hardlinks (~> 0)
jekyll-ignore-layouts (~> 0)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
2021-04-14 16:37:56 +00:00
jekyll-linked-posts (~> 0)
jekyll-locales (~> 0.1)
2021-04-14 16:37:56 +00:00
jekyll-order (~> 0)
jekyll-relative-urls (~> 0)
jekyll-seo-tag (~> 2)
jekyll-spree-client (~> 0)
jekyll-unique-urls (~> 0)
jekyll-write-and-commit-changes (~> 0)
sutty-liquid (~> 0)
2021-11-25 12:42:58 +00:00
em-websocket (0.5.3)
2018-01-29 18:09:30 +00:00
eventmachine (>= 0.12.9)
2021-11-25 12:42:58 +00:00
http_parser.rb (~> 0)
errbase (0.2.2)
2020-11-19 23:35:29 +00:00
erubi (1.10.0)
eventmachine (1.2.7-x86_64-linux-musl)
2020-07-23 23:07:52 +00:00
exception_notification (4.4.3)
2019-08-29 17:54:19 +00:00
actionmailer (>= 4.0, < 7)
activesupport (>= 4.0, < 7)
2021-06-15 20:07:52 +00:00
execjs (2.8.1)
2021-05-20 23:32:53 +00:00
factory_bot (6.2.0)
2020-07-23 23:07:52 +00:00
activesupport (>= 5.0.0)
2021-05-20 23:32:53 +00:00
factory_bot_rails (6.2.0)
factory_bot (~> 6.2.0)
2020-07-23 23:07:52 +00:00
railties (>= 5.0.0)
2022-04-11 18:39:08 +00:00
faraday (1.10.0)
faraday-em_http (~> 1.0)
faraday-em_synchrony (~> 1.0)
faraday-excon (~> 1.1)
faraday-httpclient (~> 1.0)
faraday-multipart (~> 1.0)
faraday-net_http (~> 1.0)
faraday-net_http_persistent (~> 1.0)
faraday-patron (~> 1.0)
faraday-rack (~> 1.0)
faraday-retry (~> 1.0)
ruby2_keywords (>= 0.0.4)
faraday-em_http (1.0.0)
faraday-em_synchrony (1.0.0)
faraday-excon (1.1.0)
faraday-http-cache (2.2.0)
faraday (>= 0.8)
faraday-httpclient (1.0.1)
faraday-multipart (1.0.3)
multipart-post (>= 1.2, < 3)
faraday-net_http (1.0.1)
faraday-net_http_persistent (1.2.0)
faraday-patron (1.0.0)
faraday-rack (1.0.0)
faraday-retry (1.0.3)
faraday_middleware (1.2.0)
faraday (~> 1.0)
2021-08-28 15:56:04 +00:00
fast_blank (1.0.1-x86_64-linux-musl)
fast_jsonparser (0.5.0-x86_64-linux-musl)
ffi (1.15.5-x86_64-linux-musl)
2020-05-11 21:56:42 +00:00
flamegraph (0.9.5)
2018-01-29 18:09:30 +00:00
forwardable-extended (2.6.0)
2021-02-02 22:39:38 +00:00
friendly_id (5.4.2)
2019-07-03 23:40:24 +00:00
activerecord (>= 4.0.0)
2020-09-01 21:52:05 +00:00
get_process_mem (0.2.7)
2020-04-14 22:07:46 +00:00
ffi (~> 1.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
globalid (1.0.0)
2021-08-28 15:56:04 +00:00
activesupport (>= 5.0)
2022-04-23 21:04:51 +00:00
groupdate (6.1.0)
activesupport (>= 5.2)
hairtrigger (0.2.24)
activerecord (>= 5.0, < 7)
ruby2ruby (~> 2.4)
ruby_parser (~> 3.10)
2021-08-28 15:56:04 +00:00
haml (5.2.2)
2018-01-29 18:09:30 +00:00
temple (>= 0.8.0)
tilt
2019-07-13 16:33:49 +00:00
haml-lint (0.999.999)
haml_lint
haml_lint (0.37.1)
2020-10-08 18:22:35 +00:00
haml (>= 4.0, < 5.3)
parallel (~> 1.10)
2019-07-13 16:33:49 +00:00
rainbow
rubocop (>= 0.50.0)
sysexits (~> 1.1)
2021-08-28 15:56:04 +00:00
hamlit (2.15.1-x86_64-linux-musl)
temple (>= 0.8.2)
thor
tilt
2019-07-13 16:33:49 +00:00
hamlit-rails (0.2.3)
2018-01-29 18:09:30 +00:00
actionpack (>= 4.0.1)
activesupport (>= 4.0.1)
2019-07-13 16:33:49 +00:00
hamlit (>= 1.2.0)
2018-01-29 18:09:30 +00:00
railties (>= 4.0.1)
2020-09-01 21:52:05 +00:00
heapy (0.2.0)
thor
hiredis (0.6.3-x86_64-linux-musl)
2021-11-25 12:42:58 +00:00
http_parser.rb (0.8.0-x86_64-linux-musl)
2021-04-14 16:37:56 +00:00
httparty (0.18.1)
mime-types (~> 3.0)
multi_xml (>= 0.5.2)
i18n (1.8.11)
2018-01-02 17:19:25 +00:00
concurrent-ruby (~> 1.0)
2021-03-27 14:25:15 +00:00
icalendar (2.7.1)
2020-06-16 16:35:08 +00:00
ice_cube (~> 0.16)
2021-10-22 20:36:00 +00:00
ice_cube (0.16.4)
image_processing (1.12.2)
2019-08-29 17:54:19 +00:00
mini_magick (>= 4.9.5, < 5)
2020-03-19 18:46:33 +00:00
ruby-vips (>= 2.0.17, < 3)
2020-12-24 18:02:03 +00:00
inline_svg (1.7.2)
2019-09-04 16:50:27 +00:00
activesupport (>= 3.0)
nokogiri (>= 1.6)
2021-11-25 12:42:58 +00:00
jbuilder (2.11.3)
2020-03-19 18:46:33 +00:00
activesupport (>= 5.0.0)
jekyll (4.2.2)
2020-12-29 17:40:27 +00:00
addressable (~> 2.4)
colorator (~> 1.0)
em-websocket (~> 0.5)
i18n (~> 1.0)
jekyll-sass-converter (~> 2.0)
jekyll-watch (~> 2.0)
kramdown (~> 2.3)
kramdown-parser-gfm (~> 1.0)
liquid (~> 4.0)
mercenary (~> 0.4.0)
pathutil (~> 0.9)
rouge (~> 3.0)
safe_yaml (~> 1.0)
terminal-table (~> 2.0)
2022-04-11 18:39:08 +00:00
jekyll-brotli (2.3.0)
brotli (~> 0.2.0)
jekyll (>= 3.0, < 5.0)
jekyll-commonmark (1.4.0)
commonmarker (~> 0.22)
2020-12-29 17:40:27 +00:00
jekyll-data (1.1.2)
jekyll (>= 3.3, < 5.0.0)
2021-04-14 16:37:56 +00:00
jekyll-dotenv (0.2.0)
dotenv (~> 2.7)
jekyll (~> 4)
2022-04-11 18:39:08 +00:00
jekyll-embed-urls (0.4.5)
faraday (~> 1.3)
faraday-http-cache (~> 2.2)
faraday_middleware (~> 1)
jekyll (~> 4)
loofah (~> 2.9)
ogp (~> 0.4)
ruby-oembed (~> 0.16.0)
url-privacy (~> 0)
2020-10-08 18:22:35 +00:00
jekyll-feed (0.15.1)
jekyll (>= 3.7, < 5.0)
2022-04-11 18:39:08 +00:00
jekyll-gzip (2.5.1)
jekyll (>= 3.0, < 5.0)
2021-04-14 16:37:56 +00:00
jekyll-hardlinks (0.1.2)
jekyll (~> 4)
2021-08-28 15:56:04 +00:00
jekyll-ignore-layouts (0.1.2)
2021-04-14 16:37:56 +00:00
jekyll (~> 4)
jekyll-images (0.3.2)
2020-05-23 15:49:35 +00:00
jekyll (~> 4)
ruby-filemagic (~> 0.7)
ruby-vips (~> 2)
2020-10-08 18:22:35 +00:00
jekyll-include-cache (0.2.1)
jekyll (>= 3.7, < 5.0)
2021-08-28 15:56:04 +00:00
jekyll-linked-posts (0.4.2)
2020-09-11 17:27:03 +00:00
jekyll (~> 4)
2021-11-25 12:42:58 +00:00
jekyll-locales (0.1.13)
jekyll-lunr (0.3.0)
2020-09-24 23:56:22 +00:00
loofah (~> 2.4)
2022-05-25 19:11:57 +00:00
jekyll-node-modules (0.1.0)
jekyll (~> 4)
2021-03-27 14:25:15 +00:00
jekyll-order (0.1.4)
2020-12-24 18:02:03 +00:00
jekyll-relative-urls (0.0.6)
jekyll (~> 4)
jekyll-sass-converter (2.2.0)
2019-08-29 17:54:19 +00:00
sassc (> 2.0.1, < 3.0)
2020-12-24 18:02:03 +00:00
jekyll-seo-tag (2.7.1)
jekyll (>= 3.8, < 5.0)
2021-11-25 12:42:58 +00:00
jekyll-spree-client (0.1.19)
2021-04-14 16:37:56 +00:00
fast_blank (~> 1)
2021-11-25 12:42:58 +00:00
spree-api-client (>= 0.2.4)
2020-08-29 16:03:06 +00:00
jekyll-turbolinks (0.0.5)
jekyll (~> 4)
turbolinks-source (~> 5)
2020-10-08 18:22:35 +00:00
jekyll-unique-urls (0.1.1)
2020-09-24 23:56:22 +00:00
jekyll (~> 4)
2019-03-25 21:49:26 +00:00
jekyll-watch (2.2.1)
2018-01-29 18:09:30 +00:00
listen (~> 3.0)
2021-10-22 20:36:00 +00:00
jekyll-write-and-commit-changes (0.2.1)
2021-04-14 16:37:56 +00:00
jekyll (~> 4)
rugged (~> 1)
2021-09-16 00:02:09 +00:00
kaminari (1.2.1)
activesupport (>= 4.1.0)
kaminari-actionview (= 1.2.1)
kaminari-activerecord (= 1.2.1)
kaminari-core (= 1.2.1)
kaminari-actionview (1.2.1)
actionview
kaminari-core (= 1.2.1)
kaminari-activerecord (1.2.1)
activerecord
kaminari-core (= 1.2.1)
kaminari-core (1.2.1)
kramdown (2.4.0)
2020-05-23 15:49:35 +00:00
rexml
2019-08-29 17:54:19 +00:00
kramdown-parser-gfm (1.1.0)
kramdown (~> 2.0)
2020-03-19 18:46:33 +00:00
launchy (2.5.0)
addressable (~> 2.7)
2019-03-25 21:49:26 +00:00
letter_opener (1.7.0)
2018-09-28 15:20:12 +00:00
launchy (~> 2.2)
2019-03-25 21:49:26 +00:00
liquid (4.0.3)
2018-01-02 17:19:25 +00:00
listen (3.1.5)
rb-fsevent (~> 0.9, >= 0.9.4)
rb-inotify (~> 0.9, >= 0.9.7)
ruby_dep (~> 1.2)
loaf (0.10.0)
railties (>= 3.2)
2021-10-22 20:36:00 +00:00
lockbox (0.6.6)
2020-05-11 20:32:48 +00:00
lograge (0.11.2)
actionpack (>= 4)
activesupport (>= 4)
railties (>= 4)
request_store (~> 1.0)
loofah (2.18.0)
2018-01-02 17:19:25 +00:00
crass (~> 1.0.2)
nokogiri (>= 1.5.9)
2019-03-25 21:49:26 +00:00
mail (2.7.1)
2018-01-02 17:19:25 +00:00
mini_mime (>= 0.1.1)
2021-10-22 20:36:00 +00:00
marcel (1.0.2)
2021-02-02 22:39:38 +00:00
memory_profiler (1.0.0)
2020-06-10 22:58:23 +00:00
mercenary (0.4.0)
2020-05-23 15:49:35 +00:00
method_source (1.0.0)
2021-11-25 12:42:58 +00:00
mime-types (3.4.1)
2021-04-14 16:37:56 +00:00
mime-types-data (~> 3.2015)
2021-11-25 12:42:58 +00:00
mime-types-data (3.2021.1115)
2020-09-27 16:38:49 +00:00
mini_histogram (0.3.1)
2020-12-24 18:02:03 +00:00
mini_magick (4.11.0)
2021-10-22 20:36:00 +00:00
mini_mime (1.1.2)
nokogiri Name: nokogiri Version: 1.12.5 CVE: CVE-2021-30560 GHSA: GHSA-fq42-c5rg-92c2 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2 Title: Update packaged libxml2 (2.9.12 → 2.9.13) and libxslt (1.1.34 → 1.1.35) Solution: upgrade to >= 1.13.2 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-24836 GHSA: GHSA-crjr-9rc5-ghw8 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8 Title: Inefficient Regular Expression Complexity in Nokogiri Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-24839 GHSA: GHSA-gx8x-g87m-h5q6 Criticality: High URL: https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv Title: Denial of Service (DoS) in Nokogiri on JRuby Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2018-25032 GHSA: GHSA-v6gp-9mmm-c6p5 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5 Title: Out-of-bounds Write in zlib affects Nokogiri Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-23437 GHSA: GHSA-xxx9-3xcr-gjj3 Criticality: Medium URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3 Title: XML Injection in Xerces Java affects Nokogiri Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-29181 GHSA: GHSA-xh29-r2w5-wx8m Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m Title: Improper Handling of Unexpected Data Type in Nokogiri Solution: upgrade to >= 1.13.6 Name: nokogiri Version: 1.12.5 GHSA: GHSA-cgx6-hpwq-fhv5 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-cgx6-hpwq-fhv5 Title: Integer Overflow or Wraparound in libxml2 affects Nokogiri Solution: upgrade to >= 1.13.5
2022-06-29 21:23:25 +00:00
mini_portile2 (2.8.0)
2020-10-06 19:36:39 +00:00
minima (2.5.1)
jekyll (>= 3.5, < 5.0)
jekyll-feed (~> 0.9)
jekyll-seo-tag (~> 2.1)
minitest (5.16.1)
mobility (1.2.4)
2019-07-17 22:18:48 +00:00
i18n (>= 0.6.10, < 2)
request_store (~> 1.0)
2021-04-14 16:37:56 +00:00
multi_xml (0.6.0)
2022-04-11 18:39:08 +00:00
multipart-post (2.1.1)
2021-03-27 14:15:17 +00:00
net-ssh (6.1.0)
2021-10-22 20:36:00 +00:00
netaddr (2.0.5)
2021-08-28 15:56:04 +00:00
nio4r (2.5.8-x86_64-linux-musl)
nokogiri Name: nokogiri Version: 1.12.5 CVE: CVE-2021-30560 GHSA: GHSA-fq42-c5rg-92c2 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2 Title: Update packaged libxml2 (2.9.12 → 2.9.13) and libxslt (1.1.34 → 1.1.35) Solution: upgrade to >= 1.13.2 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-24836 GHSA: GHSA-crjr-9rc5-ghw8 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8 Title: Inefficient Regular Expression Complexity in Nokogiri Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-24839 GHSA: GHSA-gx8x-g87m-h5q6 Criticality: High URL: https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv Title: Denial of Service (DoS) in Nokogiri on JRuby Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2018-25032 GHSA: GHSA-v6gp-9mmm-c6p5 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5 Title: Out-of-bounds Write in zlib affects Nokogiri Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-23437 GHSA: GHSA-xxx9-3xcr-gjj3 Criticality: Medium URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3 Title: XML Injection in Xerces Java affects Nokogiri Solution: upgrade to >= 1.13.4 Name: nokogiri Version: 1.12.5 CVE: CVE-2022-29181 GHSA: GHSA-xh29-r2w5-wx8m Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m Title: Improper Handling of Unexpected Data Type in Nokogiri Solution: upgrade to >= 1.13.6 Name: nokogiri Version: 1.12.5 GHSA: GHSA-cgx6-hpwq-fhv5 Criticality: High URL: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-cgx6-hpwq-fhv5 Title: Integer Overflow or Wraparound in libxml2 affects Nokogiri Solution: upgrade to >= 1.13.5
2022-06-29 21:23:25 +00:00
nokogiri (1.13.6-x86_64-linux-musl)
mini_portile2 (~> 2.8.0)
racc (~> 1.4)
2022-04-11 18:39:08 +00:00
observatorio-jekyll-theme (0.1.6)
jekyll (~> 4)
jekyll-brotli
jekyll-commonmark
jekyll-data (~> 1.1)
jekyll-dotenv
jekyll-embed-urls
jekyll-feed (~> 0.15)
jekyll-gzip
jekyll-hardlinks (~> 0)
jekyll-ignore-layouts (~> 0)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
jekyll-linked-posts (~> 0)
jekyll-locales (~> 0.1)
jekyll-lunr
jekyll-order (~> 0)
jekyll-relative-urls (~> 0)
jekyll-seo-tag (~> 2)
jekyll-spree-client (~> 0)
sutty-archives (>= 2.5.5)
sutty-liquid (~> 0)
oga (3.3-x86_64-linux-musl)
ast
ruby-ll (~> 2.1)
ogp (0.5.0)
oga (~> 3.3)
2019-07-03 19:57:16 +00:00
orm_adapter (0.5.0)
2021-10-22 20:36:00 +00:00
parallel (1.21.0)
parser (3.0.2.0)
2020-07-23 23:07:52 +00:00
ast (~> 2.4.1)
2019-03-25 21:49:26 +00:00
pathutil (0.16.2)
2018-01-29 18:09:30 +00:00
forwardable-extended (~> 2.6)
pg (1.2.3-x86_64-linux-musl)
pg_search (2.3.5)
activerecord (>= 5.2)
activesupport (>= 5.2)
2021-11-25 12:42:58 +00:00
prometheus_exporter (1.0.0)
2020-12-29 17:40:27 +00:00
webrick
2021-04-14 16:37:56 +00:00
pry (0.14.1)
2020-05-23 15:49:35 +00:00
coderay (~> 1.1)
method_source (~> 1.0)
public_suffix (4.0.7)
puma (5.6.4-x86_64-linux-musl)
nio4r (~> 2.0)
2021-08-28 15:56:04 +00:00
pundit (2.1.1)
2018-09-28 15:20:12 +00:00
activesupport (>= 3.0.0)
2021-10-22 20:36:00 +00:00
racc (1.6.0-x86_64-linux-musl)
2022-06-29 21:19:17 +00:00
rack (2.2.3.1)
2020-12-08 23:21:42 +00:00
rack-cors (1.1.1)
rack (>= 2.0.0)
2021-09-11 23:17:35 +00:00
rack-mini-profiler (2.3.3)
2020-05-11 21:56:42 +00:00
rack (>= 1.2.0)
2021-06-15 20:07:52 +00:00
rack-proxy (0.7.0)
rack
rack-test (2.0.2)
rack (>= 1.3)
2021-06-15 20:07:52 +00:00
radios-comunitarias-jekyll-theme (0.1.5)
2020-08-29 16:03:06 +00:00
jekyll (~> 4.0)
jekyll-data (~> 1.1)
jekyll-feed (~> 0.9)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
2020-09-11 17:27:03 +00:00
jekyll-linked-posts (~> 0)
2020-08-29 16:03:06 +00:00
jekyll-locales (~> 0.1)
jekyll-relative-urls (~> 0.0)
jekyll-seo-tag (~> 2.1)
jekyll-turbolinks (~> 0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
rails (6.1.4.7)
actioncable (= 6.1.4.7)
actionmailbox (= 6.1.4.7)
actionmailer (= 6.1.4.7)
actionpack (= 6.1.4.7)
actiontext (= 6.1.4.7)
actionview (= 6.1.4.7)
activejob (= 6.1.4.7)
activemodel (= 6.1.4.7)
activerecord (= 6.1.4.7)
activestorage (= 6.1.4.7)
activesupport (= 6.1.4.7)
2020-12-24 18:02:03 +00:00
bundler (>= 1.15.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
railties (= 6.1.4.7)
2018-01-02 17:19:25 +00:00
sprockets-rails (>= 2.0.0)
rails-dom-testing (2.0.3)
activesupport (>= 4.2.0)
nokogiri (>= 1.6)
rails-html-sanitizer (1.4.3)
2019-10-31 20:39:56 +00:00
loofah (~> 2.3)
2019-08-29 17:54:19 +00:00
rails-i18n (6.0.0)
i18n (>= 0.7, < 2)
2019-08-29 17:54:19 +00:00
railties (>= 6.0.0, < 7)
2018-04-16 16:49:51 +00:00
rails_warden (0.6.0)
warden (>= 1.2.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
railties (6.1.4.7)
actionpack (= 6.1.4.7)
activesupport (= 6.1.4.7)
2018-01-02 17:19:25 +00:00
method_source
rake (>= 0.13)
2020-12-24 18:02:03 +00:00
thor (~> 1.0)
2019-03-26 15:32:20 +00:00
rainbow (3.0.0)
rake (13.0.6)
rb-fsevent (0.11.1)
2019-12-30 18:29:40 +00:00
rb-inotify (0.10.1)
2019-03-25 21:49:26 +00:00
ffi (~> 1.0)
2022-05-25 19:11:57 +00:00
recursero-jekyll-theme (0.1.3)
jekyll (~> 4.0)
2020-09-24 23:56:22 +00:00
jekyll-data (~> 1.1)
2022-05-25 19:11:57 +00:00
jekyll-feed (~> 0.9)
2020-09-24 23:56:22 +00:00
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
2022-05-25 19:11:57 +00:00
jekyll-linked-posts (~> 0.2)
2020-09-24 23:56:22 +00:00
jekyll-locales (~> 0.1)
jekyll-lunr (~> 0.1)
2022-05-25 19:11:57 +00:00
jekyll-node-modules (~> 0.1)
jekyll-order (~> 0.1)
jekyll-relative-urls (~> 0.0)
jekyll-seo-tag (~> 2.1)
jekyll-turbolinks (~> 0)
2020-09-24 23:56:22 +00:00
jekyll-unique-urls (~> 0.1)
sutty-archives (~> 2.2)
2022-05-25 19:11:57 +00:00
sutty-liquid (~> 0.1)
2021-10-22 20:36:00 +00:00
redis (4.5.1)
2020-03-19 18:46:33 +00:00
redis-actionpack (5.2.0)
actionpack (>= 5, < 7)
redis-rack (>= 2.1.0, < 3)
2019-07-26 00:36:33 +00:00
redis-store (>= 1.1.0, < 2)
2021-06-15 20:07:52 +00:00
redis-activesupport (5.2.1)
2019-08-29 17:54:19 +00:00
activesupport (>= 3, < 7)
2019-07-26 00:36:33 +00:00
redis-store (>= 1.3, < 2)
2020-08-20 23:52:49 +00:00
redis-rack (2.1.3)
2020-03-19 18:46:33 +00:00
rack (>= 2.0.8, < 3)
2019-07-26 00:36:33 +00:00
redis-store (>= 1.2, < 2)
redis-rails (5.0.2)
redis-actionpack (>= 5.0, < 6)
redis-activesupport (>= 5.0, < 6)
redis-store (>= 1.2, < 2)
2020-07-23 23:07:52 +00:00
redis-store (1.9.0)
redis (>= 4, < 5)
2021-03-27 14:25:15 +00:00
regexp_parser (2.1.1)
request_store (1.5.0)
2019-07-17 22:18:48 +00:00
rack (>= 1.4)
responders (3.0.1)
2019-07-03 19:57:16 +00:00
actionpack (>= 5.0)
railties (>= 5.0)
2021-04-14 16:37:56 +00:00
rexml (3.2.5)
rouge (3.29.0)
2021-11-25 12:42:58 +00:00
rubocop (1.23.0)
2019-03-26 15:32:20 +00:00
parallel (~> 1.10)
2021-02-02 22:39:38 +00:00
parser (>= 3.0.0.0)
2019-03-26 15:32:20 +00:00
rainbow (>= 2.2.2, < 4.0)
2020-12-24 18:02:03 +00:00
regexp_parser (>= 1.8, < 3.0)
2020-03-19 18:46:33 +00:00
rexml
2021-10-22 20:36:00 +00:00
rubocop-ast (>= 1.12.0, < 2.0)
2019-03-26 15:32:20 +00:00
ruby-progressbar (~> 1.7)
2021-02-02 22:39:38 +00:00
unicode-display_width (>= 1.4.0, < 3.0)
2021-11-25 12:42:58 +00:00
rubocop-ast (1.13.0)
2021-05-20 23:32:53 +00:00
parser (>= 3.0.1.1)
2021-10-22 20:36:00 +00:00
rubocop-rails (2.12.4)
activesupport (>= 4.2.0)
2019-07-12 17:13:51 +00:00
rack (>= 1.1)
2021-05-20 23:32:53 +00:00
rubocop (>= 1.7.0, < 2.0)
ruby-filemagic (0.7.2-x86_64-linux-musl)
2022-04-11 18:39:08 +00:00
ruby-ll (2.1.2-x86_64-linux-musl)
ansi
ast
ruby-oembed (0.16.1)
2021-01-05 15:00:32 +00:00
ruby-progressbar (1.11.0)
2021-10-22 20:36:00 +00:00
ruby-statistics (3.0.0)
2021-11-25 12:42:58 +00:00
ruby-vips (2.1.4)
2021-03-27 14:25:15 +00:00
ffi (~> 1.12)
2022-04-11 18:39:08 +00:00
ruby2_keywords (0.0.5)
ruby2ruby (2.4.4)
ruby_parser (~> 3.1)
sexp_processor (~> 4.6)
2018-01-02 17:19:25 +00:00
ruby_dep (1.5.0)
2021-11-25 12:42:58 +00:00
ruby_parser (3.18.1)
sexp_processor (~> 4.16)
rubyzip (2.3.2)
2021-09-11 23:17:35 +00:00
rugged (1.2.0-x86_64-linux-musl)
safe_yaml (1.0.6)
2020-02-06 17:06:47 +00:00
safely_block (0.3.0)
errbase (>= 0.1.1)
sassc (2.4.0-x86_64-linux-musl)
ffi (~> 1.9)
2019-07-10 20:01:59 +00:00
sassc-rails (2.1.2)
railties (>= 4.0.0)
sassc (>= 2.0)
sprockets (> 3.0)
sprockets-rails
tilt
2021-11-25 12:42:58 +00:00
selenium-webdriver (4.1.0)
2021-10-22 20:36:00 +00:00
childprocess (>= 0.5, < 5.0)
rexml (~> 3.2, >= 3.2.5)
rubyzip (>= 1.2.2)
2021-03-27 14:25:15 +00:00
semantic_range (3.0.0)
2021-11-25 12:42:58 +00:00
sexp_processor (4.16.0)
2020-07-23 23:07:52 +00:00
share-to-fediverse-jekyll-theme (0.1.4)
2020-06-17 19:01:47 +00:00
jekyll (~> 4.0)
jekyll-data (~> 1.1)
jekyll-feed (~> 0.9)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
jekyll-relative-urls (~> 0.0)
jekyll-seo-tag (~> 2.1)
2021-02-02 22:39:38 +00:00
simpleidn (0.2.1)
2018-04-16 16:49:51 +00:00
unf (~> 0.1.4)
sourcemap (0.1.1)
2021-11-25 12:42:58 +00:00
spree-api-client (0.2.4)
2021-04-14 16:37:56 +00:00
fast_blank (~> 1)
httparty (~> 0.18.0)
2020-09-01 21:52:05 +00:00
spring (2.1.1)
2018-01-02 17:19:25 +00:00
spring-watcher-listen (2.0.1)
listen (>= 2.7, < 4.0)
spring (>= 1.2, < 3.0)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
sprockets (4.1.1)
2018-01-02 17:19:25 +00:00
concurrent-ruby (~> 1.0)
rack (> 1, < 3)
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
sprockets-rails (3.4.2)
2021-11-25 12:42:58 +00:00
actionpack (>= 5.2)
activesupport (>= 5.2)
2018-01-02 17:19:25 +00:00
sprockets (>= 3.0.0)
sqlite3 (1.4.2-x86_64-linux-musl)
2021-05-20 23:32:53 +00:00
stackprof (0.2.17-x86_64-linux-musl)
2021-03-27 14:25:15 +00:00
sucker_punch (3.0.1)
2019-09-16 16:44:29 +00:00
concurrent-ruby (~> 1.0)
2022-04-11 18:39:08 +00:00
sutty-archives (2.5.5)
2020-06-10 22:58:23 +00:00
jekyll (>= 3.6, < 5.0)
sutty-donaciones-jekyll-theme (0.1.2)
2020-06-02 21:50:49 +00:00
jekyll (~> 4.0)
jekyll-data (~> 1.1)
jekyll-feed (~> 0.9)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
2020-06-10 22:58:23 +00:00
jekyll-locales (~> 0.1)
2020-06-02 21:50:49 +00:00
jekyll-relative-urls (~> 0.0)
jekyll-seo-tag (~> 2.1)
2020-06-10 22:58:23 +00:00
sutty-archives (~> 2.2)
2020-04-09 21:58:15 +00:00
sutty-jekyll-theme (0.1.2)
jekyll (~> 4.0)
jekyll-feed (~> 0.9)
jekyll-images (~> 0.2)
jekyll-include-cache (~> 0)
jekyll-relative-urls (~> 0.0)
jekyll-seo-tag (~> 2.1)
2021-11-25 12:42:58 +00:00
sutty-liquid (0.7.4)
2020-12-24 18:02:03 +00:00
fast_blank (~> 1.0)
2020-09-24 23:56:22 +00:00
jekyll (~> 4)
2020-09-29 18:59:57 +00:00
sutty-minima (2.5.0)
jekyll (>= 3.5, < 5.0)
jekyll-feed (~> 0.9)
jekyll-seo-tag (~> 2.1)
2021-06-15 20:07:52 +00:00
symbol-fstring (1.0.2-x86_64-linux-musl)
2019-07-13 16:33:49 +00:00
sysexits (1.2.0)
2019-09-18 18:47:43 +00:00
temple (0.8.2)
2020-12-29 17:40:27 +00:00
terminal-table (2.0.0)
2019-07-26 00:36:33 +00:00
unicode-display_width (~> 1.1, >= 1.1.1)
thor (1.2.1)
tilt (2.0.10)
2021-02-11 14:30:59 +00:00
timecop (0.9.4)
turbolinks (5.2.1)
2019-03-25 21:49:26 +00:00
turbolinks-source (~> 5.2)
turbolinks-source (5.2.0)
2020-12-24 18:02:03 +00:00
tzinfo (2.0.4)
concurrent-ruby (~> 1.0)
uglifier (4.2.0)
2018-01-02 17:19:25 +00:00
execjs (>= 0.3.0, < 3)
2018-04-16 16:49:51 +00:00
unf (0.1.4)
unf_ext
2021-10-22 20:36:00 +00:00
unf_ext (0.0.8-x86_64-linux-musl)
unicode-display_width (1.8.0)
2022-04-11 18:39:08 +00:00
url-privacy (0.1.0)
2020-08-20 23:52:49 +00:00
validates_hostname (1.0.11)
2019-07-11 19:00:28 +00:00
activerecord (>= 3.0)
activesupport (>= 3.0)
2020-09-01 21:52:05 +00:00
warden (1.2.9)
rack (>= 2.0.9)
2021-11-25 12:42:58 +00:00
web-console (4.2.0)
2019-08-29 17:54:19 +00:00
actionview (>= 6.0.0)
activemodel (>= 6.0.0)
2018-01-02 17:19:25 +00:00
bindex (>= 0.4.0)
2019-08-29 17:54:19 +00:00
railties (>= 6.0.0)
2021-10-22 20:36:00 +00:00
webpacker (5.4.3)
2020-05-23 15:49:35 +00:00
activesupport (>= 5.2)
rack-proxy (>= 0.6.1)
2020-05-23 15:49:35 +00:00
railties (>= 5.2)
semantic_range (>= 2.3.0)
2020-12-29 17:40:27 +00:00
webrick (1.7.0)
2021-06-15 20:07:52 +00:00
websocket-driver (0.7.5-x86_64-linux-musl)
websocket-extensions (>= 0.1.0)
2020-06-08 23:25:43 +00:00
websocket-extensions (0.1.5)
2019-03-25 21:49:26 +00:00
xpath (3.2.0)
2018-04-16 16:49:51 +00:00
nokogiri (~> 1.8)
zeitwerk (2.6.0)
2018-01-02 17:19:25 +00:00
PLATFORMS
ruby
x86_64-linux-musl
2018-01-02 17:19:25 +00:00
DEPENDENCIES
adhesiones-jekyll-theme
2018-09-28 14:34:37 +00:00
bcrypt (~> 3.1.7)
2021-03-27 14:15:17 +00:00
bcrypt_pbkdf
2020-02-06 17:06:47 +00:00
blazer
2019-07-10 20:01:59 +00:00
bootstrap (~> 4)
2020-01-22 20:42:25 +00:00
brakeman
2018-01-02 17:19:25 +00:00
capybara (~> 2.13)
chartkick
2018-02-23 19:12:39 +00:00
commonmarker
concurrent-ruby-ext
2019-07-11 19:00:28 +00:00
database_cleaner
2020-04-14 22:07:46 +00:00
derailed_benchmarks
2019-07-03 19:57:16 +00:00
devise
devise-i18n
2019-07-05 23:55:59 +00:00
devise_invitable
2018-02-02 22:50:45 +00:00
dotenv-rails
down
2021-03-27 14:15:17 +00:00
ed25519
editorial-autogestiva-jekyll-theme
email_address!
2018-02-03 22:40:29 +00:00
exception_notification
2019-07-11 19:00:28 +00:00
factory_bot_rails
2020-07-02 14:26:00 +00:00
fast_blank
fast_jsonparser
2020-05-11 21:56:42 +00:00
flamegraph
2019-07-03 23:40:24 +00:00
friendly_id
hairtrigger
2019-07-13 16:33:49 +00:00
haml-lint
hamlit-rails
2019-07-26 00:36:33 +00:00
hiredis
httparty
2020-06-16 16:35:08 +00:00
icalendar
2019-08-22 01:09:29 +00:00
image_processing
2019-09-04 16:50:27 +00:00
inline_svg
2018-01-02 17:19:25 +00:00
jbuilder (~> 2.5)
2020-12-29 17:40:27 +00:00
jekyll (~> 4.2)
jekyll-commonmark
jekyll-data!
jekyll-images
jekyll-include-cache
2021-09-16 00:02:09 +00:00
kaminari
2018-09-28 15:20:12 +00:00
letter_opener
2018-01-02 17:19:25 +00:00
listen (>= 3.0.5, < 3.2)
loaf
lockbox
2020-05-11 20:32:48 +00:00
lograge
2020-05-11 21:56:42 +00:00
memory_profiler
2018-07-02 20:45:32 +00:00
mini_magick
2020-10-06 19:36:39 +00:00
minima
2019-07-17 22:18:48 +00:00
mobility
2021-03-27 14:15:17 +00:00
net-ssh
2021-11-25 12:42:58 +00:00
nokogiri
2022-04-11 18:39:08 +00:00
observatorio-jekyll-theme
2019-09-24 17:56:04 +00:00
pg
pg_search
2020-09-18 23:51:52 +00:00
prometheus_exporter
2018-01-29 18:09:30 +00:00
pry
2019-11-15 14:20:56 +00:00
puma
2018-09-28 15:20:12 +00:00
pundit
2020-12-08 23:21:42 +00:00
rack-cors
2020-05-11 21:56:42 +00:00
rack-mini-profiler
2020-08-29 16:03:06 +00:00
radios-comunitarias-jekyll-theme
rails: 6.1.4 Name: actionpack Version: 6.1.4.1 CVE: CVE-2021-44528 GHSA: GHSA-qphc-hf5q-v8fc Criticality: Medium URL: https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ Title: Possible Open Redirect in Host Authorization Middleware Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >= 7.0.0.rc2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-23633 GHSA: GHSA-wh98-p28r-vrc9 Criticality: High URL: https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ Title: Possible exposure of information vulnerability in Action Pack Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~> 6.1.4, >= 6.1.4.6, >= 7.0.2.2 Name: actionpack Version: 6.1.4.1 CVE: CVE-2022-22577 GHSA: GHSA-mm33-5vfq-3mm3 Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI Title: Possible XSS Vulnerability in Action Pack Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: actionview Version: 6.1.4.1 CVE: CVE-2022-27777 GHSA: GHSA-ch3h-j2vf-95pv Criticality: Unknown URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw Title: Possible XSS Vulnerability in Action View tag helpers Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~> 6.1.5, >= 6.1.5.1, >= 7.0.2.4 Name: activestorage Version: 6.1.4.1 CVE: CVE-2022-21831 GHSA: GHSA-w749-p3v6-hccq Criticality: Unknown URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI Title: Possible code injection vulnerability in Rails / Active Storage Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~> 6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
rails (~> 6.1.4.0)
rails-i18n
2018-01-29 18:09:30 +00:00
rails_warden
2022-05-25 19:11:57 +00:00
recursero-jekyll-theme (~> 0.1.0)
2019-07-26 00:36:33 +00:00
redis
redis-rails
rollups!
2019-07-12 17:13:51 +00:00
rubocop-rails
rubyzip
2019-07-11 19:00:28 +00:00
rugged
safe_yaml!
sassc-rails
2018-01-02 17:19:25 +00:00
selenium-webdriver
2020-06-17 19:01:47 +00:00
share-to-fediverse-jekyll-theme
sourcemap
2018-01-02 17:19:25 +00:00
spring
spring-watcher-listen (~> 2.0.0)
2019-08-29 17:54:19 +00:00
sqlite3
2020-04-14 22:07:46 +00:00
stackprof
2019-09-16 16:44:29 +00:00
sucker_punch
2020-06-02 21:50:49 +00:00
sutty-donaciones-jekyll-theme
sutty-jekyll-theme
sutty-liquid (>= 0.7.3)
2020-09-29 18:59:57 +00:00
sutty-minima
2020-09-29 21:36:51 +00:00
symbol-fstring
2019-07-26 00:36:33 +00:00
terminal-table
2020-02-18 16:45:08 +00:00
timecop
2018-01-02 17:19:25 +00:00
turbolinks (~> 5)
uglifier (>= 1.3.0)
2019-07-11 19:00:28 +00:00
validates_hostname
2018-01-02 17:19:25 +00:00
web-console (>= 3.3.0)
webpacker
2019-09-24 17:56:04 +00:00
yaml_db!
2018-01-02 17:19:25 +00:00
2019-10-16 17:56:49 +00:00
RUBY VERSION
ruby 2.7.1p83
2019-10-16 17:56:49 +00:00
2018-01-02 17:19:25 +00:00
BUNDLED WITH
2.2.2