Skip to content

Commit 702d5ee

Browse files
committed
title: should be parsed as a single line String.
* Also ensure that YAML stays within 80 columns.
1 parent 8b3fba3 commit 702d5ee

34 files changed

+49
-51
lines changed

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ bundle exec rspec
1818
cve: 2013-0156
1919
date: 2013-05-01
2020
url: https://github.com/rubysec/ruby-advisory-db/issues/123456
21-
title: |
21+
title:
2222
Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
2323
Remote Code Execution
2424

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Each advisory file contains the advisory information in [YAML] format:
2929
cve: 2013-0156
3030
date: 2013-05-01
3131
url: https://github.com/rubysec/ruby-advisory-db/issues/123456
32-
title: |
32+
title:
3333
Ruby on Rails params_parser.rb Action Pack Type Casting Parameter Parsing
3434
Remote Code Execution
3535

@@ -69,9 +69,9 @@ Each advisory file contains the advisory information in [YAML] format:
6969
* `osvdb` \[Integer\] (optional): Open Sourced Vulnerability Database (OSVDB) ID.
7070
* `ghsa` \[String\] (optional): GitHub Security Advisory (GHSA) ID.
7171
* `url` \[String\] (required): The URL to the full advisory.
72-
* `title` \[String\] (required): The title of the advisory or individual vulnerability.
72+
* `title` \[String\] (required): The title of the advisory or individual vulnerability. It must be a single line sentence.
7373
* `date` \[Date\] (required): The public disclosure date of the advisory.
74-
* `description` \[String\] (required): One or more paragraphs describing the vulnerability.
74+
* `description` \[String\] (required): One or more paragraphs describing the vulnerability. It may contain multiple paragraphs.
7575
* `cvss_v2` \[Float\] (optional): The [CVSSv2] score for the vulnerability.
7676
* `cvss_v3` \[Float\] (optional): The [CVSSv3] score for the vulnerability.
7777
* `unaffected_versions` \[Array\<String\>\] (optional): The version requirements for the

gems/activerecord-jdbc-adapter/OSVDB-114854.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ gem: activerecord-jdbc-adapter
33
platform: jruby
44
osvdb: 114854
55
url: http://osvdb.org/show/osvdb/114854
6-
title: |
6+
title:
77
ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub()
88
Function SQL Injection
99
date: 2013-02-25

gems/auto_awesomplete/OSVDB-132800.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
gem: auto_awesomplete
33
osvdb: 132800
44
url: https://github.com/Tab10id/auto_awesomplete/issues/2
5-
title: |
6-
auto_awesomplete Gem for Ruby allows arbitrary search execution
5+
title: auto_awesomplete Gem for Ruby allows arbitrary search execution
76
date: 2016-01-08
87
description: |
98
auto_awesomplete Gem for Ruby contains a flaw that is triggered when handling the

gems/auto_select2/OSVDB-132800.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22
gem: auto_select2
33
osvdb: 132800
44
url: https://github.com/Loriowar/auto_select2/issues/4
5-
title: |
6-
auto_select2 Gem for Ruby allows arbitrary search execution
5+
title: auto_select2 Gem for Ruby allows arbitrary search execution
76
date: 2016-01-08
87
description: |
98
auto_select2 Gem for Ruby contains a flaw that is triggered when handling the

gems/doorkeeper/CVE-2014-8144.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ cve: 2014-8144
44
osvdb: 116010
55
ghsa: 685w-vc84-wxcx
66
url: https://groups.google.com/forum/#!topic/ruby-security-ann/5_VqJtNc8jw
7-
title: |
8-
Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0
9-
and earlier.
7+
title:
8+
Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0 and
9+
earlier.
1010
date: 2014-12-18
1111
description: |
1212
Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0

gems/doorkeeper/OSVDB-118830.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
gem: doorkeeper
33
osvdb: 118830
44
url: http://www.osvdb.org/show/osvdb/118830
5-
title: |
6-
Doorkeeper Gem for Ruby stores sensitive information
7-
in production logs
5+
title: Doorkeeper Gem for Ruby stores sensitive information in production logs
86
date: 2015-02-10
97
description: |
108
Doorkeeper Gem for Ruby contains a flaw in lib/doorkeeper/engine.rb.

gems/ember-source/CVE-2013-4170.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
gem: ember-source
33
cve: 2013-4170
44
url: https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM
5-
title: |
5+
title:
66
Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data
77
date: 2013-07-25
88
description: |

gems/ember-source/CVE-2014-0013.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ gem: ember-source
33
cve: 2014-0013
44
ghsa: 8xm3-gm7c-5fjx
55
url: https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4
6-
title: |
6+
title:
77
Ember.js Potential XSS Exploit With User-Supplied Data When Binding
88
Primitive Values
99
date: 2014-01-14

gems/ember-source/CVE-2014-0014.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ gem: ember-source
33
cve: 2014-0014
44
ghsa: rcx6-7jp6-pqf2
55
url: https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4
6-
title: |
6+
title:
77
Ember.js Potential XSS Exploit With User-Supplied Data When Using {{group}}
88
Helper
99
date: 2014-01-14

0 commit comments

Comments
 (0)