Find out if you have vulnerabilities that put you at risk
Test your applicationsVULNERABILITY | AFFECTS | TYPE | PUBLISHED |
---|---|---|---|
| puma<4.3.11>=5.0.0, <5.6.2 | RubyGems | 13 Feb 2022 |
| qpid_proton>=0.9, <0.27.1 | RubyGems | 26 Jan 2022 |
| openssl<2.1.2 | RubyGems | 26 Jan 2022 |
| xapian-core<1.4.6 | RubyGems | 26 Jan 2022 |
| cgi>=0.3.0, <0.3.1>=0.2.0, <0.2.1<0.1.1 | RubyGems | 23 Jan 2022 |
| sidekiq<5.2.10>=6.0.0.pre1, <6.4.0 | RubyGems | 23 Jan 2022 |
| google-protobuf<3.19.2 | RubyGems | 7 Jan 2022 |
| solidus_frontend<2.11.14>=3.0.0, <3.0.5>=3.1.0, <3.1.5 | RubyGems | 21 Dec 2021 |
| message_bus<3.3.7 | RubyGems | 19 Dec 2021 |
| actionpack>=6.0.0, <6.0.4.2>=6.1.0, <6.1.4.2 | RubyGems | 15 Dec 2021 |
| log4j-jars>=2.0.0rc1, <2.15.0 | RubyGems | 10 Dec 2021 |
| bundler<2.2.33 | RubyGems | 9 Dec 2021 |
| solidus_core>=3.1.0, <3.1.4>=3.0.0rc2, <3.0.4<2.11.13 | RubyGems | 8 Dec 2021 |
| devise_masquerade<1.3.1 | RubyGems | 8 Dec 2021 |
| cgi<0.3.1>=0.2.0, <0.2.1>=0.1.0, <0.1.1 | RubyGems | 25 Nov 2021 |
| spree_auth_devise>=4.3.0, <4.4.1>=4.2.0, <4.2.1>=4.1.0, <4.1.1<4.0.1 | RubyGems | 19 Nov 2021 |
| spree_auth_devise<4.0.1>=4.1.0, <4.1.1>=4.2.0, <4.2.1>=4.3.0, <4.4.1 | RubyGems | 18 Nov 2021 |
| solidus_auth_devise>=3.1.0, <3.1.3>=3.0.0, <3.0.3>=2.6.0, <2.11.12>=1.0.0, <2.5.4 | RubyGems | 18 Nov 2021 |
| puppet<6.25.1>=7.0.0, <7.12.1 | RubyGems | 17 Nov 2021 |
| puppet<6.25.1>=7.0.0, <7.12.1 | RubyGems | 17 Nov 2021 |
| rails_multisite<4.0.0 | RubyGems | 16 Nov 2021 |
| date<2.0.1>=3.0.0, <3.0.2>=3.1.0, <3.1.2>=3.2.0, <3.2.1 | RubyGems | 16 Nov 2021 |
| publify_core<9.2.5 | RubyGems | 10 Nov 2021 |
| publify_core>=9.0.0.pre1, <9.2.5 | RubyGems | 2 Nov 2021 |
| fluentd>=0.14.14, <1.14.2. | RubyGems | 31 Oct 2021 |
| rails<3.0.6 | RubyGems | 20 Oct 2021 |
| evm<0.31.0 | RubyGems | 20 Oct 2021 |
| camaleon_cms<2.6.0.1 | RubyGems | 20 Oct 2021 |
| camaleon_cms>=2.0.1, <2.6.0.1 | RubyGems | 20 Oct 2021 |
| camaleon_cms>=0.1.7, <2.6.0.1 | RubyGems | 20 Oct 2021 |