greenplum-oss-docker
greenplum-oss-docker copied to clipboard
[Snyk] Security upgrade github-pages from 163 to 207
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `rubygems` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- docs/Gemfile
- docs/Gemfile.lock
Vulnerabilities that will be fixed
With an upgrade:
Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity |
---|---|---|---|---|
![]() |
479/1000 Why? Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) SNYK-RUBY-ACTIVESUPPORT-3237242 |
Yes | No Known Exploit |
![]() |
591/1000 Why? Recently disclosed, Has a fix available, CVSS 6.1 |
Cross-site Scripting (XSS) SNYK-RUBY-ACTIVESUPPORT-3360028 |
Yes | No Known Exploit |
![]() |
834/1000 Why? Mature exploit, Has a fix available, CVSS 8.1 |
Deserialization of Untrusted Data SNYK-RUBY-ACTIVESUPPORT-569598 |
Yes | Mature |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Regular Expression Denial of Service (ReDoS) SNYK-RUBY-ADDRESSABLE-1316242 |
No | No Known Exploit |
![]() |
604/1000 Why? Has a fix available, CVSS 7.8 |
DLL Loading Issue SNYK-RUBY-FFI-22037 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Improper Access Control SNYK-RUBY-JEKYLL-451462 |
Yes | No Known Exploit |
![]() |
574/1000 Why? Has a fix available, CVSS 7.2 |
Remote Code Execution SNYK-RUBY-KRAMDOWN-585939 |
Yes | No Known Exploit |
![]() |
344/1000 Why? Has a fix available, CVSS 2.6 |
XML External Entity (XXE) Injection SNYK-RUBY-NOKOGIRI-1055008 |
No | No Known Exploit |
![]() |
696/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
Denial of Service (DoS) SNYK-RUBY-NOKOGIRI-1293239 |
No | Proof of Concept |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
XML External Entity (XXE) Injection SNYK-RUBY-NOKOGIRI-1726792 |
No | No Known Exploit |
![]() |
579/1000 Why? Has a fix available, CVSS 7.3 |
XML External Entity (XXE) Injection SNYK-RUBY-NOKOGIRI-20299 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Use After Free SNYK-RUBY-NOKOGIRI-2413994 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Regular Expression Denial of Service (ReDoS) SNYK-RUBY-NOKOGIRI-2620374 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Out-of-bounds Write SNYK-RUBY-NOKOGIRI-2630623 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Denial of Service (DoS) SNYK-RUBY-NOKOGIRI-2630898 |
No | No Known Exploit |
![]() |
624/1000 Why? Has a fix available, CVSS 8.2 |
Improper Handling of Unexpected Data Type SNYK-RUBY-NOKOGIRI-2840634 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
NULL Pointer Dereference SNYK-RUBY-NOKOGIRI-3052880 |
No | No Known Exploit |
![]() |
414/1000 Why? Has a fix available, CVSS 4 |
Out-of-Bounds SNYK-RUBY-NOKOGIRI-3357692 |
No | No Known Exploit |
![]() |
529/1000 Why? Has a fix available, CVSS 6.3 |
Access Control Bypass SNYK-RUBY-NOKOGIRI-3357693 |
No | No Known Exploit |
![]() |
619/1000 Why? Has a fix available, CVSS 8.1 |
Command Injection SNYK-RUBY-NOKOGIRI-459107 |
No | No Known Exploit |
![]() |
659/1000 Why? Has a fix available, CVSS 8.9 |
Uncontrolled Memory Allocation SNYK-RUBY-NOKOGIRI-534637 |
No | No Known Exploit |
![]() |
600/1000 Why? Has a fix available, CVSS 7.5 |
Denial of Service (DoS) SNYK-RUBY-NOKOGIRI-552159 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Denial of Service (DoS) SNYK-RUBY-NOKOGIRI-72433 |
No | No Known Exploit |
![]() |
589/1000 Why? Has a fix available, CVSS 7.5 |
Directory Traversal SNYK-RUBY-TZINFO-2958048 |
No | No Known Exploit |
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Regular Expression Denial of Service (ReDoS) 🦉 Cross-site Scripting (XSS) 🦉 Deserialization of Untrusted Data 🦉 More lessons are available in Snyk Learn