2019-09-24 17:56:04 +00:00
|
|
|
GIT
|
|
|
|
remote: https://0xacab.org/sutty/yaml_db.git
|
|
|
|
revision: 40e44c29ce4290dfe4013ff4fce1be5a936fedf4
|
|
|
|
specs:
|
|
|
|
yaml_db (0.7.0)
|
|
|
|
rails (>= 3.0)
|
|
|
|
rake (>= 0.8.7)
|
|
|
|
|
2021-10-20 15:52:31 +00:00
|
|
|
GIT
|
|
|
|
remote: https://github.com/ankane/rollup.git
|
2021-11-25 12:42:58 +00:00
|
|
|
revision: 0ab6c603450175eb1004f7793e86486943cb9f72
|
2021-10-20 15:52:31 +00:00
|
|
|
branch: master
|
|
|
|
specs:
|
2021-11-25 12:42:58 +00:00
|
|
|
rollups (0.1.3)
|
2021-10-20 15:52:31 +00:00
|
|
|
activesupport (>= 5.1)
|
|
|
|
groupdate (>= 5.2)
|
|
|
|
|
2021-02-24 20:25:37 +00:00
|
|
|
GIT
|
|
|
|
remote: https://github.com/fauno/email_address
|
|
|
|
revision: 536b51f7071b68a55140c0c1726b4cd401d1c04d
|
|
|
|
branch: i18n
|
|
|
|
specs:
|
|
|
|
email_address (0.1.20)
|
|
|
|
netaddr (>= 2.0.4, < 3)
|
|
|
|
simpleidn
|
|
|
|
|
2018-01-02 17:19:25 +00:00
|
|
|
GEM
|
2020-12-29 17:40:27 +00:00
|
|
|
remote: https://gems.sutty.nl/
|
2018-01-02 17:19:25 +00:00
|
|
|
specs:
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
actioncable (6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
nio4r (~> 2.0)
|
2019-04-08 18:00:42 +00:00
|
|
|
websocket-driver (>= 0.6.1)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
actionmailbox (6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
activejob (= 6.1.4.7)
|
|
|
|
activerecord (= 6.1.4.7)
|
|
|
|
activestorage (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2019-08-29 17:54:19 +00:00
|
|
|
mail (>= 2.7.1)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
actionmailer (6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
actionview (= 6.1.4.7)
|
|
|
|
activejob (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
mail (~> 2.5, >= 2.5.4)
|
|
|
|
rails-dom-testing (~> 2.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
actionpack (6.1.4.7)
|
|
|
|
actionview (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2020-12-24 18:02:03 +00:00
|
|
|
rack (~> 2.0, >= 2.0.9)
|
2018-01-02 17:19:25 +00:00
|
|
|
rack-test (>= 0.6.3)
|
|
|
|
rails-dom-testing (~> 2.0)
|
2019-08-29 17:54:19 +00:00
|
|
|
rails-html-sanitizer (~> 1.0, >= 1.2.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
actiontext (6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
activerecord (= 6.1.4.7)
|
|
|
|
activestorage (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2019-08-29 17:54:19 +00:00
|
|
|
nokogiri (>= 1.8.5)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
actionview (6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
builder (~> 3.1)
|
|
|
|
erubi (~> 1.4)
|
|
|
|
rails-dom-testing (~> 2.0)
|
2019-08-29 17:54:19 +00:00
|
|
|
rails-html-sanitizer (~> 1.1, >= 1.2.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
activejob (6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
globalid (>= 0.3.6)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
activemodel (6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
|
|
|
activerecord (6.1.4.7)
|
|
|
|
activemodel (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
|
|
|
activestorage (6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
activejob (= 6.1.4.7)
|
|
|
|
activerecord (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2021-03-27 14:25:15 +00:00
|
|
|
marcel (~> 1.0.0)
|
2021-07-13 20:22:05 +00:00
|
|
|
mini_mime (>= 1.1.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
activesupport (6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
concurrent-ruby (~> 1.0, >= 1.0.2)
|
2020-12-24 18:02:03 +00:00
|
|
|
i18n (>= 1.6, < 2)
|
|
|
|
minitest (>= 5.1)
|
|
|
|
tzinfo (~> 2.0)
|
|
|
|
zeitwerk (~> 2.3)
|
2021-07-13 20:22:05 +00:00
|
|
|
addressable (2.8.0)
|
2019-09-11 16:01:30 +00:00
|
|
|
public_suffix (>= 2.0.2, < 5.0)
|
2020-09-01 21:52:05 +00:00
|
|
|
adhesiones-jekyll-theme (0.2.1)
|
2020-06-17 20:32:07 +00:00
|
|
|
jekyll (~> 4.0)
|
|
|
|
jekyll-data (~> 1.1)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
|
|
|
jekyll-locales (~> 0.1)
|
|
|
|
jekyll-relative-urls (~> 0.0)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
2021-02-02 22:39:38 +00:00
|
|
|
ast (2.4.2)
|
2021-09-11 23:17:35 +00:00
|
|
|
autoprefixer-rails (10.3.3.0)
|
2021-08-28 15:56:04 +00:00
|
|
|
execjs (~> 2)
|
2021-04-26 16:04:55 +00:00
|
|
|
bcrypt (3.1.16-x86_64-linux-musl)
|
|
|
|
bcrypt_pbkdf (1.1.0-x86_64-linux-musl)
|
2021-10-22 20:36:00 +00:00
|
|
|
benchmark-ips (2.9.2)
|
2021-04-26 16:04:55 +00:00
|
|
|
bindex (0.8.1-x86_64-linux-musl)
|
2022-06-29 21:26:29 +00:00
|
|
|
blazer (2.6.4)
|
2020-02-06 17:06:47 +00:00
|
|
|
activerecord (>= 5)
|
|
|
|
chartkick (>= 3.2)
|
|
|
|
railties (>= 5)
|
|
|
|
safely_block (>= 0.1.1)
|
2021-02-02 22:39:38 +00:00
|
|
|
bootstrap (4.6.0)
|
2019-07-10 20:01:59 +00:00
|
|
|
autoprefixer-rails (>= 9.1.0)
|
|
|
|
popper_js (>= 1.14.3, < 2)
|
|
|
|
sassc-rails (>= 2.0.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
brakeman (5.1.2)
|
2019-12-19 18:02:46 +00:00
|
|
|
builder (3.2.4)
|
2018-04-16 16:49:51 +00:00
|
|
|
capybara (2.18.0)
|
2018-01-02 17:19:25 +00:00
|
|
|
addressable
|
|
|
|
mini_mime (>= 0.1.3)
|
|
|
|
nokogiri (>= 1.3.3)
|
|
|
|
rack (>= 1.0.0)
|
|
|
|
rack-test (>= 0.5.4)
|
2018-04-16 16:49:51 +00:00
|
|
|
xpath (>= 2.0, < 4.0)
|
2022-06-29 21:26:29 +00:00
|
|
|
chartkick (4.2.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
childprocess (4.1.0)
|
2020-06-18 16:39:10 +00:00
|
|
|
coderay (1.1.3)
|
2018-01-29 18:09:30 +00:00
|
|
|
colorator (1.1.0)
|
2022-06-29 21:28:29 +00:00
|
|
|
commonmarker (0.23.5-x86_64-linux-musl)
|
2021-06-15 20:07:52 +00:00
|
|
|
concurrent-ruby (1.1.9)
|
|
|
|
concurrent-ruby-ext (1.1.9-x86_64-linux-musl)
|
|
|
|
concurrent-ruby (= 1.1.9)
|
2020-03-19 18:46:33 +00:00
|
|
|
crass (1.0.6)
|
2021-02-11 14:30:59 +00:00
|
|
|
database_cleaner (2.0.1)
|
2021-02-02 22:39:38 +00:00
|
|
|
database_cleaner-active_record (~> 2.0.0)
|
2021-05-20 23:32:53 +00:00
|
|
|
database_cleaner-active_record (2.0.1)
|
2021-02-02 22:39:38 +00:00
|
|
|
activerecord (>= 5.a)
|
|
|
|
database_cleaner-core (~> 2.0.0)
|
2021-02-11 14:30:59 +00:00
|
|
|
database_cleaner-core (2.0.1)
|
2021-11-25 12:42:58 +00:00
|
|
|
dead_end (3.1.0)
|
2021-07-13 20:22:05 +00:00
|
|
|
derailed_benchmarks (2.1.1)
|
2020-04-14 22:07:46 +00:00
|
|
|
benchmark-ips (~> 2)
|
2021-02-02 22:39:38 +00:00
|
|
|
dead_end
|
2020-04-14 22:07:46 +00:00
|
|
|
get_process_mem (~> 0)
|
|
|
|
heapy (~> 0)
|
2021-02-02 22:39:38 +00:00
|
|
|
memory_profiler (>= 0, < 2)
|
|
|
|
mini_histogram (>= 0.3.0)
|
2020-04-14 22:07:46 +00:00
|
|
|
rack (>= 1)
|
2021-02-11 14:30:59 +00:00
|
|
|
rack-test
|
2020-04-14 22:07:46 +00:00
|
|
|
rake (> 10, < 14)
|
|
|
|
ruby-statistics (>= 2.1)
|
|
|
|
thor (>= 0.19, < 2)
|
2021-05-20 23:32:53 +00:00
|
|
|
devise (4.8.0)
|
2019-07-03 19:57:16 +00:00
|
|
|
bcrypt (~> 3.0)
|
|
|
|
orm_adapter (~> 0.1)
|
2019-08-29 17:54:19 +00:00
|
|
|
railties (>= 4.1.0)
|
2019-07-03 19:57:16 +00:00
|
|
|
responders
|
|
|
|
warden (~> 1.2.3)
|
2021-11-25 12:42:58 +00:00
|
|
|
devise-i18n (1.10.1)
|
2021-07-13 20:22:05 +00:00
|
|
|
devise (>= 4.8.0)
|
2021-05-20 23:32:53 +00:00
|
|
|
devise_invitable (2.0.5)
|
2019-07-05 23:55:59 +00:00
|
|
|
actionmailer (>= 5.0)
|
|
|
|
devise (>= 4.6)
|
2020-07-23 23:07:52 +00:00
|
|
|
dotenv (2.7.6)
|
|
|
|
dotenv-rails (2.7.6)
|
|
|
|
dotenv (= 2.7.6)
|
|
|
|
railties (>= 3.2)
|
2021-10-22 20:36:00 +00:00
|
|
|
down (5.2.4)
|
2021-08-28 15:56:04 +00:00
|
|
|
addressable (~> 2.8)
|
2021-04-26 16:04:55 +00:00
|
|
|
ed25519 (1.2.4-x86_64-linux-musl)
|
2021-05-20 23:32:53 +00:00
|
|
|
editorial-autogestiva-jekyll-theme (0.3.4)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll (~> 4)
|
|
|
|
jekyll-commonmark (~> 1.3)
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll-data (~> 1.1)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll-dotenv (>= 0.2)
|
|
|
|
jekyll-feed (~> 0.15)
|
|
|
|
jekyll-hardlinks (~> 0)
|
|
|
|
jekyll-ignore-layouts (~> 0)
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll-linked-posts (~> 0)
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll-locales (~> 0.1)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll-order (~> 0)
|
|
|
|
jekyll-relative-urls (~> 0)
|
|
|
|
jekyll-seo-tag (~> 2)
|
|
|
|
jekyll-spree-client (~> 0)
|
|
|
|
jekyll-unique-urls (~> 0)
|
|
|
|
jekyll-write-and-commit-changes (~> 0)
|
|
|
|
sutty-liquid (~> 0)
|
2021-11-25 12:42:58 +00:00
|
|
|
em-websocket (0.5.3)
|
2018-01-29 18:09:30 +00:00
|
|
|
eventmachine (>= 0.12.9)
|
2021-11-25 12:42:58 +00:00
|
|
|
http_parser.rb (~> 0)
|
2022-06-29 21:26:29 +00:00
|
|
|
errbase (0.2.2)
|
2020-11-19 23:35:29 +00:00
|
|
|
erubi (1.10.0)
|
2021-04-26 16:04:55 +00:00
|
|
|
eventmachine (1.2.7-x86_64-linux-musl)
|
2020-07-23 23:07:52 +00:00
|
|
|
exception_notification (4.4.3)
|
2019-08-29 17:54:19 +00:00
|
|
|
actionmailer (>= 4.0, < 7)
|
|
|
|
activesupport (>= 4.0, < 7)
|
2021-06-15 20:07:52 +00:00
|
|
|
execjs (2.8.1)
|
2021-05-20 23:32:53 +00:00
|
|
|
factory_bot (6.2.0)
|
2020-07-23 23:07:52 +00:00
|
|
|
activesupport (>= 5.0.0)
|
2021-05-20 23:32:53 +00:00
|
|
|
factory_bot_rails (6.2.0)
|
|
|
|
factory_bot (~> 6.2.0)
|
2020-07-23 23:07:52 +00:00
|
|
|
railties (>= 5.0.0)
|
2021-08-28 15:56:04 +00:00
|
|
|
fast_blank (1.0.1-x86_64-linux-musl)
|
2021-04-26 16:04:55 +00:00
|
|
|
fast_jsonparser (0.5.0-x86_64-linux-musl)
|
2022-06-29 21:24:50 +00:00
|
|
|
ffi (1.15.5-x86_64-linux-musl)
|
2020-05-11 21:56:42 +00:00
|
|
|
flamegraph (0.9.5)
|
2018-01-29 18:09:30 +00:00
|
|
|
forwardable-extended (2.6.0)
|
2021-02-02 22:39:38 +00:00
|
|
|
friendly_id (5.4.2)
|
2019-07-03 23:40:24 +00:00
|
|
|
activerecord (>= 4.0.0)
|
2020-09-01 21:52:05 +00:00
|
|
|
get_process_mem (0.2.7)
|
2020-04-14 22:07:46 +00:00
|
|
|
ffi (~> 1.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
globalid (1.0.0)
|
2021-08-28 15:56:04 +00:00
|
|
|
activesupport (>= 5.0)
|
2021-09-03 18:23:11 +00:00
|
|
|
groupdate (5.2.2)
|
|
|
|
activesupport (>= 5)
|
2021-05-06 15:26:36 +00:00
|
|
|
hairtrigger (0.2.24)
|
|
|
|
activerecord (>= 5.0, < 7)
|
|
|
|
ruby2ruby (~> 2.4)
|
|
|
|
ruby_parser (~> 3.10)
|
2021-08-28 15:56:04 +00:00
|
|
|
haml (5.2.2)
|
2018-01-29 18:09:30 +00:00
|
|
|
temple (>= 0.8.0)
|
|
|
|
tilt
|
2019-07-13 16:33:49 +00:00
|
|
|
haml-lint (0.999.999)
|
|
|
|
haml_lint
|
2021-07-13 20:22:05 +00:00
|
|
|
haml_lint (0.37.1)
|
2020-10-08 18:22:35 +00:00
|
|
|
haml (>= 4.0, < 5.3)
|
|
|
|
parallel (~> 1.10)
|
2019-07-13 16:33:49 +00:00
|
|
|
rainbow
|
|
|
|
rubocop (>= 0.50.0)
|
|
|
|
sysexits (~> 1.1)
|
2021-08-28 15:56:04 +00:00
|
|
|
hamlit (2.15.1-x86_64-linux-musl)
|
2021-04-26 16:04:55 +00:00
|
|
|
temple (>= 0.8.2)
|
|
|
|
thor
|
|
|
|
tilt
|
2019-07-13 16:33:49 +00:00
|
|
|
hamlit-rails (0.2.3)
|
2018-01-29 18:09:30 +00:00
|
|
|
actionpack (>= 4.0.1)
|
|
|
|
activesupport (>= 4.0.1)
|
2019-07-13 16:33:49 +00:00
|
|
|
hamlit (>= 1.2.0)
|
2018-01-29 18:09:30 +00:00
|
|
|
railties (>= 4.0.1)
|
2020-09-01 21:52:05 +00:00
|
|
|
heapy (0.2.0)
|
|
|
|
thor
|
2021-04-26 16:04:55 +00:00
|
|
|
hiredis (0.6.3-x86_64-linux-musl)
|
2021-11-25 12:42:58 +00:00
|
|
|
http_parser.rb (0.8.0-x86_64-linux-musl)
|
2021-04-14 16:37:56 +00:00
|
|
|
httparty (0.18.1)
|
|
|
|
mime-types (~> 3.0)
|
|
|
|
multi_xml (>= 0.5.2)
|
2022-06-29 21:49:53 +00:00
|
|
|
i18n (1.8.11)
|
2018-01-02 17:19:25 +00:00
|
|
|
concurrent-ruby (~> 1.0)
|
2021-03-27 14:25:15 +00:00
|
|
|
icalendar (2.7.1)
|
2020-06-16 16:35:08 +00:00
|
|
|
ice_cube (~> 0.16)
|
2021-10-22 20:36:00 +00:00
|
|
|
ice_cube (0.16.4)
|
2022-06-29 21:24:50 +00:00
|
|
|
image_processing (1.12.2)
|
2019-08-29 17:54:19 +00:00
|
|
|
mini_magick (>= 4.9.5, < 5)
|
2020-03-19 18:46:33 +00:00
|
|
|
ruby-vips (>= 2.0.17, < 3)
|
2020-12-24 18:02:03 +00:00
|
|
|
inline_svg (1.7.2)
|
2019-09-04 16:50:27 +00:00
|
|
|
activesupport (>= 3.0)
|
|
|
|
nokogiri (>= 1.6)
|
2021-11-25 12:42:58 +00:00
|
|
|
jbuilder (2.11.3)
|
2020-03-19 18:46:33 +00:00
|
|
|
activesupport (>= 5.0.0)
|
2022-06-29 21:28:29 +00:00
|
|
|
jekyll (4.2.2)
|
2020-12-29 17:40:27 +00:00
|
|
|
addressable (~> 2.4)
|
|
|
|
colorator (~> 1.0)
|
|
|
|
em-websocket (~> 0.5)
|
|
|
|
i18n (~> 1.0)
|
|
|
|
jekyll-sass-converter (~> 2.0)
|
|
|
|
jekyll-watch (~> 2.0)
|
|
|
|
kramdown (~> 2.3)
|
|
|
|
kramdown-parser-gfm (~> 1.0)
|
|
|
|
liquid (~> 4.0)
|
|
|
|
mercenary (~> 0.4.0)
|
|
|
|
pathutil (~> 0.9)
|
|
|
|
rouge (~> 3.0)
|
|
|
|
safe_yaml (~> 1.0)
|
|
|
|
terminal-table (~> 2.0)
|
2022-06-29 21:28:29 +00:00
|
|
|
jekyll-commonmark (1.4.0)
|
|
|
|
commonmarker (~> 0.22)
|
2020-12-29 17:40:27 +00:00
|
|
|
jekyll-data (1.1.2)
|
|
|
|
jekyll (>= 3.3, < 5.0.0)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll-dotenv (0.2.0)
|
|
|
|
dotenv (~> 2.7)
|
|
|
|
jekyll (~> 4)
|
2020-10-08 18:22:35 +00:00
|
|
|
jekyll-feed (0.15.1)
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll (>= 3.7, < 5.0)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll-hardlinks (0.1.2)
|
|
|
|
jekyll (~> 4)
|
2021-08-28 15:56:04 +00:00
|
|
|
jekyll-ignore-layouts (0.1.2)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll (~> 4)
|
2021-11-25 12:42:58 +00:00
|
|
|
jekyll-images (0.3.0)
|
2020-05-23 15:49:35 +00:00
|
|
|
jekyll (~> 4)
|
2020-03-24 17:06:33 +00:00
|
|
|
ruby-filemagic (~> 0.7)
|
|
|
|
ruby-vips (~> 2)
|
2020-10-08 18:22:35 +00:00
|
|
|
jekyll-include-cache (0.2.1)
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll (>= 3.7, < 5.0)
|
2021-08-28 15:56:04 +00:00
|
|
|
jekyll-linked-posts (0.4.2)
|
2020-09-11 17:27:03 +00:00
|
|
|
jekyll (~> 4)
|
2021-11-25 12:42:58 +00:00
|
|
|
jekyll-locales (0.1.13)
|
2021-07-13 20:22:05 +00:00
|
|
|
jekyll-lunr (0.3.0)
|
2020-09-24 23:56:22 +00:00
|
|
|
loofah (~> 2.4)
|
2021-03-27 14:25:15 +00:00
|
|
|
jekyll-order (0.1.4)
|
2020-12-24 18:02:03 +00:00
|
|
|
jekyll-relative-urls (0.0.6)
|
|
|
|
jekyll (~> 4)
|
2022-06-29 21:28:29 +00:00
|
|
|
jekyll-sass-converter (2.2.0)
|
2019-08-29 17:54:19 +00:00
|
|
|
sassc (> 2.0.1, < 3.0)
|
2020-12-24 18:02:03 +00:00
|
|
|
jekyll-seo-tag (2.7.1)
|
|
|
|
jekyll (>= 3.8, < 5.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
jekyll-spree-client (0.1.19)
|
2021-04-14 16:37:56 +00:00
|
|
|
fast_blank (~> 1)
|
2021-11-25 12:42:58 +00:00
|
|
|
spree-api-client (>= 0.2.4)
|
2020-08-29 16:03:06 +00:00
|
|
|
jekyll-turbolinks (0.0.5)
|
|
|
|
jekyll (~> 4)
|
|
|
|
turbolinks-source (~> 5)
|
2020-10-08 18:22:35 +00:00
|
|
|
jekyll-unique-urls (0.1.1)
|
2020-09-24 23:56:22 +00:00
|
|
|
jekyll (~> 4)
|
2019-03-25 21:49:26 +00:00
|
|
|
jekyll-watch (2.2.1)
|
2018-01-29 18:09:30 +00:00
|
|
|
listen (~> 3.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
jekyll-write-and-commit-changes (0.2.1)
|
2021-04-14 16:37:56 +00:00
|
|
|
jekyll (~> 4)
|
|
|
|
rugged (~> 1)
|
2021-09-16 00:02:09 +00:00
|
|
|
kaminari (1.2.1)
|
|
|
|
activesupport (>= 4.1.0)
|
|
|
|
kaminari-actionview (= 1.2.1)
|
|
|
|
kaminari-activerecord (= 1.2.1)
|
|
|
|
kaminari-core (= 1.2.1)
|
|
|
|
kaminari-actionview (1.2.1)
|
|
|
|
actionview
|
|
|
|
kaminari-core (= 1.2.1)
|
|
|
|
kaminari-activerecord (1.2.1)
|
|
|
|
activerecord
|
|
|
|
kaminari-core (= 1.2.1)
|
|
|
|
kaminari-core (1.2.1)
|
2022-06-29 21:28:29 +00:00
|
|
|
kramdown (2.4.0)
|
2020-05-23 15:49:35 +00:00
|
|
|
rexml
|
2019-08-29 17:54:19 +00:00
|
|
|
kramdown-parser-gfm (1.1.0)
|
|
|
|
kramdown (~> 2.0)
|
2020-03-19 18:46:33 +00:00
|
|
|
launchy (2.5.0)
|
|
|
|
addressable (~> 2.7)
|
2019-03-25 21:49:26 +00:00
|
|
|
letter_opener (1.7.0)
|
2018-09-28 15:20:12 +00:00
|
|
|
launchy (~> 2.2)
|
2019-03-25 21:49:26 +00:00
|
|
|
liquid (4.0.3)
|
2018-01-02 17:19:25 +00:00
|
|
|
listen (3.1.5)
|
|
|
|
rb-fsevent (~> 0.9, >= 0.9.4)
|
|
|
|
rb-inotify (~> 0.9, >= 0.9.7)
|
|
|
|
ruby_dep (~> 1.2)
|
2021-05-09 15:59:33 +00:00
|
|
|
loaf (0.10.0)
|
|
|
|
railties (>= 3.2)
|
2021-10-22 20:36:00 +00:00
|
|
|
lockbox (0.6.6)
|
2020-05-11 20:32:48 +00:00
|
|
|
lograge (0.11.2)
|
|
|
|
actionpack (>= 4)
|
|
|
|
activesupport (>= 4)
|
|
|
|
railties (>= 4)
|
|
|
|
request_store (~> 1.0)
|
2022-06-29 21:26:29 +00:00
|
|
|
loofah (2.18.0)
|
2018-01-02 17:19:25 +00:00
|
|
|
crass (~> 1.0.2)
|
|
|
|
nokogiri (>= 1.5.9)
|
2019-03-25 21:49:26 +00:00
|
|
|
mail (2.7.1)
|
2018-01-02 17:19:25 +00:00
|
|
|
mini_mime (>= 0.1.1)
|
2021-10-22 20:36:00 +00:00
|
|
|
marcel (1.0.2)
|
2021-02-02 22:39:38 +00:00
|
|
|
memory_profiler (1.0.0)
|
2020-06-10 22:58:23 +00:00
|
|
|
mercenary (0.4.0)
|
2020-05-23 15:49:35 +00:00
|
|
|
method_source (1.0.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
mime-types (3.4.1)
|
2021-04-14 16:37:56 +00:00
|
|
|
mime-types-data (~> 3.2015)
|
2021-11-25 12:42:58 +00:00
|
|
|
mime-types-data (3.2021.1115)
|
2020-09-27 16:38:49 +00:00
|
|
|
mini_histogram (0.3.1)
|
2020-12-24 18:02:03 +00:00
|
|
|
mini_magick (4.11.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
mini_mime (1.1.2)
|
2022-06-29 21:23:25 +00:00
|
|
|
mini_portile2 (2.8.0)
|
2020-10-06 19:36:39 +00:00
|
|
|
minima (2.5.1)
|
|
|
|
jekyll (>= 3.5, < 5.0)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
2022-06-29 21:26:29 +00:00
|
|
|
minitest (5.16.1)
|
2021-11-29 14:30:55 +00:00
|
|
|
mobility (1.2.4)
|
2019-07-17 22:18:48 +00:00
|
|
|
i18n (>= 0.6.10, < 2)
|
|
|
|
request_store (~> 1.0)
|
2021-04-14 16:37:56 +00:00
|
|
|
multi_xml (0.6.0)
|
2021-03-27 14:15:17 +00:00
|
|
|
net-ssh (6.1.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
netaddr (2.0.5)
|
2021-08-28 15:56:04 +00:00
|
|
|
nio4r (2.5.8-x86_64-linux-musl)
|
2022-06-29 21:23:25 +00:00
|
|
|
nokogiri (1.13.6-x86_64-linux-musl)
|
|
|
|
mini_portile2 (~> 2.8.0)
|
2021-04-26 16:04:55 +00:00
|
|
|
racc (~> 1.4)
|
2019-07-03 19:57:16 +00:00
|
|
|
orm_adapter (0.5.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
parallel (1.21.0)
|
2021-07-13 20:22:05 +00:00
|
|
|
parser (3.0.2.0)
|
2020-07-23 23:07:52 +00:00
|
|
|
ast (~> 2.4.1)
|
2019-03-25 21:49:26 +00:00
|
|
|
pathutil (0.16.2)
|
2018-01-29 18:09:30 +00:00
|
|
|
forwardable-extended (~> 2.6)
|
2021-04-26 16:04:55 +00:00
|
|
|
pg (1.2.3-x86_64-linux-musl)
|
2021-05-06 15:26:36 +00:00
|
|
|
pg_search (2.3.5)
|
|
|
|
activerecord (>= 5.2)
|
|
|
|
activesupport (>= 5.2)
|
2021-11-25 12:42:58 +00:00
|
|
|
prometheus_exporter (1.0.0)
|
2020-12-29 17:40:27 +00:00
|
|
|
webrick
|
2021-04-14 16:37:56 +00:00
|
|
|
pry (0.14.1)
|
2020-05-23 15:49:35 +00:00
|
|
|
coderay (~> 1.1)
|
|
|
|
method_source (~> 1.0)
|
2022-06-29 21:28:29 +00:00
|
|
|
public_suffix (4.0.7)
|
2022-06-29 21:21:05 +00:00
|
|
|
puma (5.6.4-x86_64-linux-musl)
|
2021-04-26 16:04:55 +00:00
|
|
|
nio4r (~> 2.0)
|
2021-08-28 15:56:04 +00:00
|
|
|
pundit (2.1.1)
|
2018-09-28 15:20:12 +00:00
|
|
|
activesupport (>= 3.0.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
racc (1.6.0-x86_64-linux-musl)
|
2022-06-29 21:19:17 +00:00
|
|
|
rack (2.2.3.1)
|
2020-12-08 23:21:42 +00:00
|
|
|
rack-cors (1.1.1)
|
|
|
|
rack (>= 2.0.0)
|
2021-09-11 23:17:35 +00:00
|
|
|
rack-mini-profiler (2.3.3)
|
2020-05-11 21:56:42 +00:00
|
|
|
rack (>= 1.2.0)
|
2021-06-15 20:07:52 +00:00
|
|
|
rack-proxy (0.7.0)
|
2019-08-30 20:47:31 +00:00
|
|
|
rack
|
2022-06-29 21:26:29 +00:00
|
|
|
rack-test (2.0.2)
|
|
|
|
rack (>= 1.3)
|
2021-06-15 20:07:52 +00:00
|
|
|
radios-comunitarias-jekyll-theme (0.1.5)
|
2020-08-29 16:03:06 +00:00
|
|
|
jekyll (~> 4.0)
|
|
|
|
jekyll-data (~> 1.1)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
2020-09-11 17:27:03 +00:00
|
|
|
jekyll-linked-posts (~> 0)
|
2020-08-29 16:03:06 +00:00
|
|
|
jekyll-locales (~> 0.1)
|
|
|
|
jekyll-relative-urls (~> 0.0)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
|
|
|
jekyll-turbolinks (~> 0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
rails (6.1.4.7)
|
|
|
|
actioncable (= 6.1.4.7)
|
|
|
|
actionmailbox (= 6.1.4.7)
|
|
|
|
actionmailer (= 6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
actiontext (= 6.1.4.7)
|
|
|
|
actionview (= 6.1.4.7)
|
|
|
|
activejob (= 6.1.4.7)
|
|
|
|
activemodel (= 6.1.4.7)
|
|
|
|
activerecord (= 6.1.4.7)
|
|
|
|
activestorage (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2020-12-24 18:02:03 +00:00
|
|
|
bundler (>= 1.15.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
railties (= 6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
sprockets-rails (>= 2.0.0)
|
|
|
|
rails-dom-testing (2.0.3)
|
|
|
|
activesupport (>= 4.2.0)
|
|
|
|
nokogiri (>= 1.6)
|
2022-06-29 21:26:29 +00:00
|
|
|
rails-html-sanitizer (1.4.3)
|
2019-10-31 20:39:56 +00:00
|
|
|
loofah (~> 2.3)
|
2019-08-29 17:54:19 +00:00
|
|
|
rails-i18n (6.0.0)
|
2019-07-08 21:23:43 +00:00
|
|
|
i18n (>= 0.7, < 2)
|
2019-08-29 17:54:19 +00:00
|
|
|
railties (>= 6.0.0, < 7)
|
2018-04-16 16:49:51 +00:00
|
|
|
rails_warden (0.6.0)
|
|
|
|
warden (>= 1.2.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
railties (6.1.4.7)
|
|
|
|
actionpack (= 6.1.4.7)
|
|
|
|
activesupport (= 6.1.4.7)
|
2018-01-02 17:19:25 +00:00
|
|
|
method_source
|
2021-07-13 20:22:05 +00:00
|
|
|
rake (>= 0.13)
|
2020-12-24 18:02:03 +00:00
|
|
|
thor (~> 1.0)
|
2019-03-26 15:32:20 +00:00
|
|
|
rainbow (3.0.0)
|
2021-07-13 20:22:05 +00:00
|
|
|
rake (13.0.6)
|
2022-06-29 21:28:29 +00:00
|
|
|
rb-fsevent (0.11.1)
|
2019-12-30 18:29:40 +00:00
|
|
|
rb-inotify (0.10.1)
|
2019-03-25 21:49:26 +00:00
|
|
|
ffi (~> 1.0)
|
2021-06-15 20:07:52 +00:00
|
|
|
recursero-jekyll-theme (0.2.0)
|
|
|
|
jekyll (~> 4)
|
|
|
|
jekyll-commonmark (~> 1.3)
|
2020-09-24 23:56:22 +00:00
|
|
|
jekyll-data (~> 1.1)
|
2021-06-15 20:07:52 +00:00
|
|
|
jekyll-dotenv (>= 0.2)
|
|
|
|
jekyll-feed (~> 0.15)
|
|
|
|
jekyll-ignore-layouts (~> 0)
|
2020-09-24 23:56:22 +00:00
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
2021-06-15 20:07:52 +00:00
|
|
|
jekyll-linked-posts (~> 0)
|
2020-09-24 23:56:22 +00:00
|
|
|
jekyll-locales (~> 0.1)
|
|
|
|
jekyll-lunr (~> 0.1)
|
2021-06-15 20:07:52 +00:00
|
|
|
jekyll-order (~> 0)
|
|
|
|
jekyll-relative-urls (~> 0)
|
|
|
|
jekyll-seo-tag (~> 2)
|
2020-09-24 23:56:22 +00:00
|
|
|
jekyll-unique-urls (~> 0.1)
|
|
|
|
sutty-archives (~> 2.2)
|
2021-06-15 20:07:52 +00:00
|
|
|
sutty-liquid (~> 0)
|
2021-10-22 20:36:00 +00:00
|
|
|
redis (4.5.1)
|
2020-03-19 18:46:33 +00:00
|
|
|
redis-actionpack (5.2.0)
|
|
|
|
actionpack (>= 5, < 7)
|
|
|
|
redis-rack (>= 2.1.0, < 3)
|
2019-07-26 00:36:33 +00:00
|
|
|
redis-store (>= 1.1.0, < 2)
|
2021-06-15 20:07:52 +00:00
|
|
|
redis-activesupport (5.2.1)
|
2019-08-29 17:54:19 +00:00
|
|
|
activesupport (>= 3, < 7)
|
2019-07-26 00:36:33 +00:00
|
|
|
redis-store (>= 1.3, < 2)
|
2020-08-20 23:52:49 +00:00
|
|
|
redis-rack (2.1.3)
|
2020-03-19 18:46:33 +00:00
|
|
|
rack (>= 2.0.8, < 3)
|
2019-07-26 00:36:33 +00:00
|
|
|
redis-store (>= 1.2, < 2)
|
|
|
|
redis-rails (5.0.2)
|
|
|
|
redis-actionpack (>= 5.0, < 6)
|
|
|
|
redis-activesupport (>= 5.0, < 6)
|
|
|
|
redis-store (>= 1.2, < 2)
|
2020-07-23 23:07:52 +00:00
|
|
|
redis-store (1.9.0)
|
2019-12-20 18:51:20 +00:00
|
|
|
redis (>= 4, < 5)
|
2021-03-27 14:25:15 +00:00
|
|
|
regexp_parser (2.1.1)
|
2019-12-20 18:51:20 +00:00
|
|
|
request_store (1.5.0)
|
2019-07-17 22:18:48 +00:00
|
|
|
rack (>= 1.4)
|
2020-06-18 16:39:10 +00:00
|
|
|
responders (3.0.1)
|
2019-07-03 19:57:16 +00:00
|
|
|
actionpack (>= 5.0)
|
|
|
|
railties (>= 5.0)
|
2021-04-14 16:37:56 +00:00
|
|
|
rexml (3.2.5)
|
2022-06-29 21:28:29 +00:00
|
|
|
rouge (3.29.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
rubocop (1.23.0)
|
2019-03-26 15:32:20 +00:00
|
|
|
parallel (~> 1.10)
|
2021-02-02 22:39:38 +00:00
|
|
|
parser (>= 3.0.0.0)
|
2019-03-26 15:32:20 +00:00
|
|
|
rainbow (>= 2.2.2, < 4.0)
|
2020-12-24 18:02:03 +00:00
|
|
|
regexp_parser (>= 1.8, < 3.0)
|
2020-03-19 18:46:33 +00:00
|
|
|
rexml
|
2021-10-22 20:36:00 +00:00
|
|
|
rubocop-ast (>= 1.12.0, < 2.0)
|
2019-03-26 15:32:20 +00:00
|
|
|
ruby-progressbar (~> 1.7)
|
2021-02-02 22:39:38 +00:00
|
|
|
unicode-display_width (>= 1.4.0, < 3.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
rubocop-ast (1.13.0)
|
2021-05-20 23:32:53 +00:00
|
|
|
parser (>= 3.0.1.1)
|
2021-10-22 20:36:00 +00:00
|
|
|
rubocop-rails (2.12.4)
|
2020-06-18 16:39:10 +00:00
|
|
|
activesupport (>= 4.2.0)
|
2019-07-12 17:13:51 +00:00
|
|
|
rack (>= 1.1)
|
2021-05-20 23:32:53 +00:00
|
|
|
rubocop (>= 1.7.0, < 2.0)
|
2021-04-26 16:04:55 +00:00
|
|
|
ruby-filemagic (0.7.2-x86_64-linux-musl)
|
2021-01-05 15:00:32 +00:00
|
|
|
ruby-progressbar (1.11.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
ruby-statistics (3.0.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
ruby-vips (2.1.4)
|
2021-03-27 14:25:15 +00:00
|
|
|
ffi (~> 1.12)
|
2021-05-06 15:26:36 +00:00
|
|
|
ruby2ruby (2.4.4)
|
|
|
|
ruby_parser (~> 3.1)
|
|
|
|
sexp_processor (~> 4.6)
|
2018-01-02 17:19:25 +00:00
|
|
|
ruby_dep (1.5.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
ruby_parser (3.18.1)
|
|
|
|
sexp_processor (~> 4.16)
|
2021-07-13 20:22:05 +00:00
|
|
|
rubyzip (2.3.2)
|
2021-09-11 23:17:35 +00:00
|
|
|
rugged (1.2.0-x86_64-linux-musl)
|
2020-12-30 16:48:24 +00:00
|
|
|
safe_yaml (1.0.6)
|
2020-02-06 17:06:47 +00:00
|
|
|
safely_block (0.3.0)
|
|
|
|
errbase (>= 0.1.1)
|
2021-04-26 16:04:55 +00:00
|
|
|
sassc (2.4.0-x86_64-linux-musl)
|
|
|
|
ffi (~> 1.9)
|
2019-07-10 20:01:59 +00:00
|
|
|
sassc-rails (2.1.2)
|
|
|
|
railties (>= 4.0.0)
|
|
|
|
sassc (>= 2.0)
|
|
|
|
sprockets (> 3.0)
|
|
|
|
sprockets-rails
|
|
|
|
tilt
|
2021-11-25 12:42:58 +00:00
|
|
|
selenium-webdriver (4.1.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
childprocess (>= 0.5, < 5.0)
|
|
|
|
rexml (~> 3.2, >= 3.2.5)
|
2019-12-20 18:51:20 +00:00
|
|
|
rubyzip (>= 1.2.2)
|
2021-03-27 14:25:15 +00:00
|
|
|
semantic_range (3.0.0)
|
2021-11-25 12:42:58 +00:00
|
|
|
sexp_processor (4.16.0)
|
2020-07-23 23:07:52 +00:00
|
|
|
share-to-fediverse-jekyll-theme (0.1.4)
|
2020-06-17 19:01:47 +00:00
|
|
|
jekyll (~> 4.0)
|
|
|
|
jekyll-data (~> 1.1)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
|
|
|
jekyll-relative-urls (~> 0.0)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
2021-02-02 22:39:38 +00:00
|
|
|
simpleidn (0.2.1)
|
2018-04-16 16:49:51 +00:00
|
|
|
unf (~> 0.1.4)
|
2020-12-07 16:21:46 +00:00
|
|
|
sourcemap (0.1.1)
|
2021-11-25 12:42:58 +00:00
|
|
|
spree-api-client (0.2.4)
|
2021-04-14 16:37:56 +00:00
|
|
|
fast_blank (~> 1)
|
|
|
|
httparty (~> 0.18.0)
|
2020-09-01 21:52:05 +00:00
|
|
|
spring (2.1.1)
|
2018-01-02 17:19:25 +00:00
|
|
|
spring-watcher-listen (2.0.1)
|
|
|
|
listen (>= 2.7, < 4.0)
|
|
|
|
spring (>= 1.2, < 3.0)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
sprockets (4.1.1)
|
2018-01-02 17:19:25 +00:00
|
|
|
concurrent-ruby (~> 1.0)
|
|
|
|
rack (> 1, < 3)
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
sprockets-rails (3.4.2)
|
2021-11-25 12:42:58 +00:00
|
|
|
actionpack (>= 5.2)
|
|
|
|
activesupport (>= 5.2)
|
2018-01-02 17:19:25 +00:00
|
|
|
sprockets (>= 3.0.0)
|
2021-04-26 16:04:55 +00:00
|
|
|
sqlite3 (1.4.2-x86_64-linux-musl)
|
2021-05-20 23:32:53 +00:00
|
|
|
stackprof (0.2.17-x86_64-linux-musl)
|
2021-03-27 14:25:15 +00:00
|
|
|
sucker_punch (3.0.1)
|
2019-09-16 16:44:29 +00:00
|
|
|
concurrent-ruby (~> 1.0)
|
2021-03-27 14:25:15 +00:00
|
|
|
sutty-archives (2.5.4)
|
2020-06-10 22:58:23 +00:00
|
|
|
jekyll (>= 3.6, < 5.0)
|
|
|
|
sutty-donaciones-jekyll-theme (0.1.2)
|
2020-06-02 21:50:49 +00:00
|
|
|
jekyll (~> 4.0)
|
|
|
|
jekyll-data (~> 1.1)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
2020-06-10 22:58:23 +00:00
|
|
|
jekyll-locales (~> 0.1)
|
2020-06-02 21:50:49 +00:00
|
|
|
jekyll-relative-urls (~> 0.0)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
2020-06-10 22:58:23 +00:00
|
|
|
sutty-archives (~> 2.2)
|
2020-04-09 21:58:15 +00:00
|
|
|
sutty-jekyll-theme (0.1.2)
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll (~> 4.0)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-images (~> 0.2)
|
|
|
|
jekyll-include-cache (~> 0)
|
|
|
|
jekyll-relative-urls (~> 0.0)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
2021-11-25 12:42:58 +00:00
|
|
|
sutty-liquid (0.7.4)
|
2020-12-24 18:02:03 +00:00
|
|
|
fast_blank (~> 1.0)
|
2020-09-24 23:56:22 +00:00
|
|
|
jekyll (~> 4)
|
2020-09-29 18:59:57 +00:00
|
|
|
sutty-minima (2.5.0)
|
|
|
|
jekyll (>= 3.5, < 5.0)
|
|
|
|
jekyll-feed (~> 0.9)
|
|
|
|
jekyll-seo-tag (~> 2.1)
|
2021-06-15 20:07:52 +00:00
|
|
|
symbol-fstring (1.0.2-x86_64-linux-musl)
|
2019-07-13 16:33:49 +00:00
|
|
|
sysexits (1.2.0)
|
2019-09-18 18:47:43 +00:00
|
|
|
temple (0.8.2)
|
2020-12-29 17:40:27 +00:00
|
|
|
terminal-table (2.0.0)
|
2019-07-26 00:36:33 +00:00
|
|
|
unicode-display_width (~> 1.1, >= 1.1.1)
|
2022-06-29 21:26:29 +00:00
|
|
|
thor (1.2.1)
|
2019-12-20 18:51:20 +00:00
|
|
|
tilt (2.0.10)
|
2021-02-11 14:30:59 +00:00
|
|
|
timecop (0.9.4)
|
2019-12-20 18:51:20 +00:00
|
|
|
turbolinks (5.2.1)
|
2019-03-25 21:49:26 +00:00
|
|
|
turbolinks-source (~> 5.2)
|
|
|
|
turbolinks-source (5.2.0)
|
2020-12-24 18:02:03 +00:00
|
|
|
tzinfo (2.0.4)
|
|
|
|
concurrent-ruby (~> 1.0)
|
2019-12-20 18:51:20 +00:00
|
|
|
uglifier (4.2.0)
|
2018-01-02 17:19:25 +00:00
|
|
|
execjs (>= 0.3.0, < 3)
|
2018-04-16 16:49:51 +00:00
|
|
|
unf (0.1.4)
|
|
|
|
unf_ext
|
2021-10-22 20:36:00 +00:00
|
|
|
unf_ext (0.0.8-x86_64-linux-musl)
|
|
|
|
unicode-display_width (1.8.0)
|
2020-08-20 23:52:49 +00:00
|
|
|
validates_hostname (1.0.11)
|
2019-07-11 19:00:28 +00:00
|
|
|
activerecord (>= 3.0)
|
|
|
|
activesupport (>= 3.0)
|
2020-09-01 21:52:05 +00:00
|
|
|
warden (1.2.9)
|
|
|
|
rack (>= 2.0.9)
|
2021-11-25 12:42:58 +00:00
|
|
|
web-console (4.2.0)
|
2019-08-29 17:54:19 +00:00
|
|
|
actionview (>= 6.0.0)
|
|
|
|
activemodel (>= 6.0.0)
|
2018-01-02 17:19:25 +00:00
|
|
|
bindex (>= 0.4.0)
|
2019-08-29 17:54:19 +00:00
|
|
|
railties (>= 6.0.0)
|
2021-10-22 20:36:00 +00:00
|
|
|
webpacker (5.4.3)
|
2020-05-23 15:49:35 +00:00
|
|
|
activesupport (>= 5.2)
|
2019-08-30 20:47:31 +00:00
|
|
|
rack-proxy (>= 0.6.1)
|
2020-05-23 15:49:35 +00:00
|
|
|
railties (>= 5.2)
|
|
|
|
semantic_range (>= 2.3.0)
|
2020-12-29 17:40:27 +00:00
|
|
|
webrick (1.7.0)
|
2021-06-15 20:07:52 +00:00
|
|
|
websocket-driver (0.7.5-x86_64-linux-musl)
|
2021-04-26 16:04:55 +00:00
|
|
|
websocket-extensions (>= 0.1.0)
|
2020-06-08 23:25:43 +00:00
|
|
|
websocket-extensions (0.1.5)
|
2019-03-25 21:49:26 +00:00
|
|
|
xpath (3.2.0)
|
2018-04-16 16:49:51 +00:00
|
|
|
nokogiri (~> 1.8)
|
2022-06-29 21:26:29 +00:00
|
|
|
zeitwerk (2.6.0)
|
2018-01-02 17:19:25 +00:00
|
|
|
|
|
|
|
PLATFORMS
|
|
|
|
ruby
|
2021-04-26 16:04:55 +00:00
|
|
|
x86_64-linux-musl
|
2018-01-02 17:19:25 +00:00
|
|
|
|
|
|
|
DEPENDENCIES
|
2020-06-17 20:32:07 +00:00
|
|
|
adhesiones-jekyll-theme
|
2018-09-28 14:34:37 +00:00
|
|
|
bcrypt (~> 3.1.7)
|
2021-03-27 14:15:17 +00:00
|
|
|
bcrypt_pbkdf
|
2020-02-06 17:06:47 +00:00
|
|
|
blazer
|
2019-07-10 20:01:59 +00:00
|
|
|
bootstrap (~> 4)
|
2020-01-22 20:42:25 +00:00
|
|
|
brakeman
|
2018-01-02 17:19:25 +00:00
|
|
|
capybara (~> 2.13)
|
2021-10-07 18:24:21 +00:00
|
|
|
chartkick
|
2018-02-23 19:12:39 +00:00
|
|
|
commonmarker
|
2021-02-19 17:05:49 +00:00
|
|
|
concurrent-ruby-ext
|
2019-07-11 19:00:28 +00:00
|
|
|
database_cleaner
|
2020-04-14 22:07:46 +00:00
|
|
|
derailed_benchmarks
|
2019-07-03 19:57:16 +00:00
|
|
|
devise
|
|
|
|
devise-i18n
|
2019-07-05 23:55:59 +00:00
|
|
|
devise_invitable
|
2018-02-02 22:50:45 +00:00
|
|
|
dotenv-rails
|
2020-12-07 16:21:46 +00:00
|
|
|
down
|
2021-03-27 14:15:17 +00:00
|
|
|
ed25519
|
2020-03-24 17:06:33 +00:00
|
|
|
editorial-autogestiva-jekyll-theme
|
2021-02-24 20:25:37 +00:00
|
|
|
email_address!
|
2018-02-03 22:40:29 +00:00
|
|
|
exception_notification
|
2019-07-11 19:00:28 +00:00
|
|
|
factory_bot_rails
|
2020-07-02 14:26:00 +00:00
|
|
|
fast_blank
|
2020-12-07 16:21:46 +00:00
|
|
|
fast_jsonparser
|
2020-05-11 21:56:42 +00:00
|
|
|
flamegraph
|
2019-07-03 23:40:24 +00:00
|
|
|
friendly_id
|
2021-05-06 15:26:36 +00:00
|
|
|
hairtrigger
|
2019-07-13 16:33:49 +00:00
|
|
|
haml-lint
|
|
|
|
hamlit-rails
|
2019-07-26 00:36:33 +00:00
|
|
|
hiredis
|
2021-05-29 20:42:45 +00:00
|
|
|
httparty
|
2020-06-16 16:35:08 +00:00
|
|
|
icalendar
|
2019-08-22 01:09:29 +00:00
|
|
|
image_processing
|
2019-09-04 16:50:27 +00:00
|
|
|
inline_svg
|
2018-01-02 17:19:25 +00:00
|
|
|
jbuilder (~> 2.5)
|
2020-12-29 17:40:27 +00:00
|
|
|
jekyll (~> 4.2)
|
2020-10-30 21:57:46 +00:00
|
|
|
jekyll-commonmark
|
2020-03-24 17:06:33 +00:00
|
|
|
jekyll-data!
|
2020-10-30 21:57:46 +00:00
|
|
|
jekyll-images
|
|
|
|
jekyll-include-cache
|
2021-09-16 00:02:09 +00:00
|
|
|
kaminari
|
2018-09-28 15:20:12 +00:00
|
|
|
letter_opener
|
2018-01-02 17:19:25 +00:00
|
|
|
listen (>= 3.0.5, < 3.2)
|
2021-05-09 15:59:33 +00:00
|
|
|
loaf
|
2020-08-10 23:40:12 +00:00
|
|
|
lockbox
|
2020-05-11 20:32:48 +00:00
|
|
|
lograge
|
2020-05-11 21:56:42 +00:00
|
|
|
memory_profiler
|
2018-07-02 20:45:32 +00:00
|
|
|
mini_magick
|
2020-10-06 19:36:39 +00:00
|
|
|
minima
|
2019-07-17 22:18:48 +00:00
|
|
|
mobility
|
2021-03-27 14:15:17 +00:00
|
|
|
net-ssh
|
2021-11-25 12:42:58 +00:00
|
|
|
nokogiri
|
2019-09-24 17:56:04 +00:00
|
|
|
pg
|
2021-05-06 15:26:36 +00:00
|
|
|
pg_search
|
2020-09-18 23:51:52 +00:00
|
|
|
prometheus_exporter
|
2018-01-29 18:09:30 +00:00
|
|
|
pry
|
2019-11-15 14:20:56 +00:00
|
|
|
puma
|
2018-09-28 15:20:12 +00:00
|
|
|
pundit
|
2020-12-08 23:21:42 +00:00
|
|
|
rack-cors
|
2020-05-11 21:56:42 +00:00
|
|
|
rack-mini-profiler
|
2020-08-29 16:03:06 +00:00
|
|
|
radios-comunitarias-jekyll-theme
|
rails: 6.1.4
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2021-44528
GHSA: GHSA-qphc-hf5q-v8fc
Criticality: Medium
URL:
https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ
Title: Possible Open Redirect in Host Authorization Middleware
Solution: upgrade to ~> 6.0.4, >= 6.0.4.2, ~> 6.1.4, >= 6.1.4.2, >=
7.0.0.rc2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-23633
GHSA: GHSA-wh98-p28r-vrc9
Criticality: High
URL:
https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ
Title: Possible exposure of information vulnerability in Action Pack
Solution: upgrade to ~> 5.2.6, >= 5.2.6.2, ~> 6.0.4, >= 6.0.4.6, ~>
6.1.4, >= 6.1.4.6, >= 7.0.2.2
Name: actionpack
Version: 6.1.4.1
CVE: CVE-2022-22577
GHSA: GHSA-mm33-5vfq-3mm3
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
Title: Possible XSS Vulnerability in Action Pack
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: actionview
Version: 6.1.4.1
CVE: CVE-2022-27777
GHSA: GHSA-ch3h-j2vf-95pv
Criticality: Unknown
URL: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
Title: Possible XSS Vulnerability in Action View tag helpers
Solution: upgrade to ~> 5.2.7, >= 5.2.7.1, ~> 6.0.4, >= 6.0.4.8, ~>
6.1.5, >= 6.1.5.1, >= 7.0.2.4
Name: activestorage
Version: 6.1.4.1
CVE: CVE-2022-21831
GHSA: GHSA-w749-p3v6-hccq
Criticality: Unknown
URL: https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI
Title: Possible code injection vulnerability in Rails / Active Storage
Solution: upgrade to ~> 5.2.6, >= 5.2.6.3, ~> 6.0.4, >= 6.0.4.7, ~>
6.1.4, >= 6.1.4.7, >= 7.0.2.3
2022-06-29 21:38:44 +00:00
|
|
|
rails (~> 6.1.4.0)
|
2019-07-08 21:23:43 +00:00
|
|
|
rails-i18n
|
2018-01-29 18:09:30 +00:00
|
|
|
rails_warden
|
2020-09-24 23:56:22 +00:00
|
|
|
recursero-jekyll-theme
|
2019-07-26 00:36:33 +00:00
|
|
|
redis
|
|
|
|
redis-rails
|
2021-10-20 15:52:31 +00:00
|
|
|
rollups!
|
2019-07-12 17:13:51 +00:00
|
|
|
rubocop-rails
|
2019-07-24 23:51:29 +00:00
|
|
|
rubyzip
|
2019-07-11 19:00:28 +00:00
|
|
|
rugged
|
2020-12-30 16:48:24 +00:00
|
|
|
safe_yaml!
|
2019-12-20 18:59:42 +00:00
|
|
|
sassc-rails
|
2018-01-02 17:19:25 +00:00
|
|
|
selenium-webdriver
|
2020-06-17 19:01:47 +00:00
|
|
|
share-to-fediverse-jekyll-theme
|
2020-12-07 16:21:46 +00:00
|
|
|
sourcemap
|
2018-01-02 17:19:25 +00:00
|
|
|
spring
|
|
|
|
spring-watcher-listen (~> 2.0.0)
|
2019-08-29 17:54:19 +00:00
|
|
|
sqlite3
|
2020-04-14 22:07:46 +00:00
|
|
|
stackprof
|
2019-09-16 16:44:29 +00:00
|
|
|
sucker_punch
|
2020-06-02 21:50:49 +00:00
|
|
|
sutty-donaciones-jekyll-theme
|
2020-03-24 17:06:33 +00:00
|
|
|
sutty-jekyll-theme
|
2021-06-26 23:35:19 +00:00
|
|
|
sutty-liquid (>= 0.7.3)
|
2020-09-29 18:59:57 +00:00
|
|
|
sutty-minima
|
2020-09-29 21:36:51 +00:00
|
|
|
symbol-fstring
|
2019-07-26 00:36:33 +00:00
|
|
|
terminal-table
|
2020-02-18 16:45:08 +00:00
|
|
|
timecop
|
2018-01-02 17:19:25 +00:00
|
|
|
turbolinks (~> 5)
|
|
|
|
uglifier (>= 1.3.0)
|
2019-07-11 19:00:28 +00:00
|
|
|
validates_hostname
|
2018-01-02 17:19:25 +00:00
|
|
|
web-console (>= 3.3.0)
|
2019-08-30 20:47:31 +00:00
|
|
|
webpacker
|
2019-09-24 17:56:04 +00:00
|
|
|
yaml_db!
|
2018-01-02 17:19:25 +00:00
|
|
|
|
2019-10-16 17:56:49 +00:00
|
|
|
RUBY VERSION
|
2021-02-19 17:05:49 +00:00
|
|
|
ruby 2.7.1p83
|
2019-10-16 17:56:49 +00:00
|
|
|
|
2018-01-02 17:19:25 +00:00
|
|
|
BUNDLED WITH
|
2021-04-26 16:04:55 +00:00
|
|
|
2.2.2
|