Ruby Advisory Database Logo

Ruby Advisory Database

0
Free
Visit Website

The Ruby Advisory Database is a community effort to compile all security advisories that are relevant to Ruby libraries. You can check your own Gemfile.locks against this database by using bundler-audit. Support Ruby security! Do you know about a vulnerability that isn't listed in this database? Open an issue or submit a PR. Directory Structure: The database is a list of directories that match the names of Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are named using the advisories' CVE identifier number. - gems/ - actionpack/ - CVE-2014-0130.yml - CVE-2014-7818.yml - CVE-2014-7829.yml - CVE-2015-7576.yml - CVE-2015-7581.yml - CVE-2016-0751.yml - CVE-2016-0752.yml - rubies/ - jruby/ ... - mruby/ ... - ruby/ ... - gems/ The gems/ directory contains sub-directories that match the names of the Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are named using the advisories' CVE or GHSA ID. - rubies/ The rubies/ directory contains sub-directories for each Ruby implementation. Within each directory are one or more advisory files for the Ruby library.

FEATURES

ALTERNATIVES

A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

A JavaScript scanner built in PHP for scraping URLs and other information.

Simple script to check a domain's email protections and identify vulnerabilities.

Vulnerable web application for beginners in penetration testing.

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

A collection of 132 exploits added to Packet Storm in April 2024

LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

A categorized collection of bug bounty write-ups for various vulnerabilities.