Ruby Advisory Database Logo

Ruby Advisory Database

0
Free
Updated 11 March 2025
Visit Website

The Ruby Advisory Database is a community effort to compile all security advisories that are relevant to Ruby libraries. You can check your own Gemfile.locks against this database by using bundler-audit. Support Ruby security! Do you know about a vulnerability that isn't listed in this database? Open an issue or submit a PR. Directory Structure: The database is a list of directories that match the names of Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are named using the advisories' CVE identifier number. - gems/ - actionpack/ - CVE-2014-0130.yml - CVE-2014-7818.yml - CVE-2014-7829.yml - CVE-2015-7576.yml - CVE-2015-7581.yml - CVE-2016-0751.yml - CVE-2016-0752.yml - rubies/ - jruby/ ... - mruby/ ... - ruby/ ... - gems/ The gems/ directory contains sub-directories that match the names of the Ruby libraries on rubygems.org. Within each directory are one or more advisory files for the Ruby library. These advisory files are named using the advisories' CVE or GHSA ID. - rubies/ The rubies/ directory contains sub-directories for each Ruby implementation. Within each directory are one or more advisory files for the Ruby library.

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

Gamma Ray is a software that helps developers to look for vulnerabilities on their Node.js applications with a pluggable infrastructure for integration with vulnerabilities databases.

OWASP Project for making vulnerability management easier.

List of publicly disclosed vulnerabilities with security filters and detailed advisories.

An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.

Python-based extension for integrating a Yara scanner into Burp Suite for on-demand website scans based on custom rules.

A vulnerable Android application demonstrating various security issues and vulnerabilities

A collection of Ansible roles for hardening various systems and services

A utility for testing AWS Lambda functions for SQL Injection vulnerabilities using SQLMap attacks.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved