Ruby Advisory Database Logo

Ruby Advisory Database

Visit Website

The Ruby Advisory Database is a community effort to compile all security advisories that are relevant to Ruby libraries. You can check your own Gemfile.locks against this database by using bundler-audit. Support Ruby security! Do you know about a vulnerability that isn't listed in this database? Open an issue or submit a PR. Directory Structure: The database is a list of directories that match the names of Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are named using the advisories' CVE identifier number. - gems/ - actionpack/ - CVE-2014-0130.yml - CVE-2014-7818.yml - CVE-2014-7829.yml - CVE-2015-7576.yml - CVE-2015-7581.yml - CVE-2016-0751.yml - CVE-2016-0752.yml - rubies/ - jruby/ ... - mruby/ ... - ruby/ ... - gems/ The gems/ directory contains sub-directories that match the names of the Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are named using the advisories' CVE or GHSA ID. - rubies/ The rubies/ directory contains sub-directories for each Ruby implementation. Within each directory are one or more advisory files for the Ruby library.

FEATURES

ALTERNATIVES

A wargame composed of 27 levels, with files needed in /vortex/ directory.

Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.

Automate software supply chain security by blocking malicious open source components

A list of vulnerable applications for testing and learning

A GitHub App that monitors GitHub organizations or repositories for adherence to security best practices and detects policy violations.

A tool to find and search for registered CVEs, creating a local CVE database for offline use.

Powerful PowerShell script for identifying missing software patches for local privilege escalation vulnerabilities.

Simple script to check a domain's email protections and identify vulnerabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved