Skip to content

Conversation

kugaevsky
Copy link
Member

snyk-top-banner

Snyk has created this PR to fix 12 vulnerabilities in the rubygems dependencies of this project.

Snyk changed the following file(s):

  • Gemfile
⚠️ Warning
Failed to update the Gemfile.lock, please update manually before merging.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
high severity Memory Allocation with Excessive Size Value
SNYK-RUBY-NETIMAP-10006666
  721  
medium severity Cross-site Scripting (XSS)
SNYK-RUBY-ACTIONVIEW-2803851
  591  
medium severity Cross-site Scripting (XSS)
SNYK-RUBY-ACTIVESUPPORT-3360028
  519  
medium severity Cross-site Scripting (XSS)
SNYK-RUBY-ACTIONPACK-2803847
  484  
medium severity Improper Input Validation
SNYK-RUBY-ACTIONPACK-7210237
  484  
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-RUBY-ACTIONPACK-3237231
  479  
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-RUBY-ACTIONPACK-3237232
  479  
medium severity Exposure of Data Element to Wrong Session
SNYK-RUBY-ACTIONPACK-6274388
  479  
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-RUBY-ACTIVESUPPORT-3237242
  479  
medium severity Cross-site Scripting (XSS)
SNYK-RUBY-ACTIONPACK-5741907
  449  
medium severity Information Exposure
SNYK-RUBY-ACTIVESUPPORT-5851458
  429  
medium severity Information Exposure
SNYK-RUBY-RAILTIES-5851410
  429  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Cross-site Scripting (XSS)
🦉 Regular Expression Denial of Service (ReDoS)
🦉 Improper Input Validation

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants