[SUSE-SU-2020:1570-1] Security update for ruby2.1
Severity
Important
Affected Packages
48
CVEs
42
Security update for ruby2.1
This update for ruby2.1 fixes the following issues:
Security issues fixed:
- CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
- CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
- CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
- CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
- CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
- CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
- CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
- CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
- CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
- CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
- CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
- CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
- CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
- CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
- CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
- CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
- CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
- CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
- CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
- CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
- CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
- CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
- CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
- CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
- CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
- CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
- CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
- CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
- CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
- CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
- CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
- CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
- CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
- CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
- CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
- CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
- CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
- CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
- CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
- CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).
Non-security issue fixed:
- Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).
Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)
- ID
- SUSE-SU-2020:1570-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2020/suse-su-20201570-1/
- Published
-
2020-06-09T09:16:12
(4 years ago) - Modified
-
2020-06-09T09:16:12
(4 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2017-867
- ALAS-2017-871
- ALAS-2017-880
- ALAS-2017-906
- ALAS-2017-915
- ALAS-2018-1113
- ALAS-2018-978
- ALAS-2018-983
- ALAS-2019-1255
- ALAS-2020-1416
- ALAS-2020-1422
- ALAS-2020-1423
- ALAS-2020-1426
- ALAS2-2018-983
- ALAS2-2019-1143
- ALAS2-2019-1249
- ALAS2-2019-1276
- ALAS2-2021-1641
- ALAS2-2023-2311
- ALAS2-2023-2375
- ALAS2-2024-2486
- ALBA-2019:3384
- ALPINE:CVE-2017-0898
- ALPINE:CVE-2017-0899
- ALPINE:CVE-2017-0900
- ALPINE:CVE-2017-0901
- ALPINE:CVE-2017-0902
- ALPINE:CVE-2017-10784
- ALPINE:CVE-2017-14033
- ALPINE:CVE-2017-14064
- ALPINE:CVE-2017-17405
- ALPINE:CVE-2017-17742
- ALPINE:CVE-2017-9228
- ALPINE:CVE-2017-9229
- ALPINE:CVE-2018-16395
- ALPINE:CVE-2018-16396
- ALPINE:CVE-2018-6914
- ALPINE:CVE-2018-8777
- ALPINE:CVE-2018-8778
- ALPINE:CVE-2018-8779
- ALPINE:CVE-2018-8780
- ALPINE:CVE-2019-15845
- ALPINE:CVE-2019-16201
- ALPINE:CVE-2019-16254
- ALPINE:CVE-2019-16255
- ALPINE:CVE-2019-8320
- ALPINE:CVE-2019-8321
- ALPINE:CVE-2019-8322
- ALPINE:CVE-2019-8323
- ALPINE:CVE-2019-8324
- ALPINE:CVE-2019-8325
- ALPINE:CVE-2020-10663
- ALSA-2019:1972
- ALSA-2021:2587
- ALSA-2021:2588
- ASA-201910-2
- DSA-3966-1
- DSA-4031-1
- DSA-4219-1
- DSA-4259-1
- DSA-4332-1
- DSA-4433-1
- DSA-4586-1
- DSA-4587-1
- DSA-4721-1
- ELSA-2018-0378
- ELSA-2018-3738
- ELSA-2019-1235
- ELSA-2019-1972
- ELSA-2019-2028
- ELSA-2020-5724
- ELSA-2021-2587
- ELSA-2021-2588
- FEDORA-2017-20214ad330
- FEDORA-2017-4166994614
- FEDORA-2017-5ade380ab2
- FEDORA-2017-60997f0d14
- FEDORA-2017-6e6f4f95e6
- FEDORA-2017-7faa3d2e78
- FEDORA-2017-81cf93b7c2
- FEDORA-2017-b674dc22ad
- FEDORA-2017-b8bb4b86e2
- FEDORA-2017-e136d63c99
- FEDORA-2017-e2d6d0067f
- FEDORA-2017-e314044789
- FEDORA-2017-ee01a2ced6
- FEDORA-2017-f16ba664e7
- FEDORA-2017-f318871e3b
- FEDORA-2018-0db545e976
- FEDORA-2018-190ecd2ef8
- FEDORA-2018-1fffa787e7
- FEDORA-2018-319b9d0f68
- FEDORA-2018-40ed78700c
- FEDORA-2018-6070bcf454
- FEDORA-2018-75e780a7c2
- FEDORA-2018-7be77249d4
- FEDORA-2018-a459acd54b
- FEDORA-2018-dd8162c004
- FEDORA-2019-a155364f3c
- FEDORA-2019-feac6674b7
- FEDORA-2020-26df92331a
- FEDORA-2020-a95706b117
- FEDORA-2020-d171bf636d
- FREEBSD:27B12D04-4722-11E9-8B7C-B5E01141761F
- FREEBSD:2C8BD00D-ADA2-11E7-82AF-8DBFF7D75206
- FREEBSD:40194E1C-6D89-11EA-8082-80EE73419AF3
- FREEBSD:95B01379-9D52-11E7-A25C-471BAFC3262F
- FREEBSD:AFC60484-0652-440E-B01A-5EF814747F06
- FREEBSD:B396CF6C-62E6-11E7-9DEF-B499BAEBFEAF
- FREEBSD:DD644964-E10E-11E7-8097-0800271D4B9C
- FREEBSD:EB69BCF2-18EF-4AA2-BB0C-83B263364089
- FREEBSD:F7FCB75C-E537-11E9-863E-B9B7AF01BA9E
- GLSA-201710-01
- GLSA-201710-18
- GLSA-201802-05
- GLSA-202003-06
- MAVEN:GHSA-74PV-V9GH-H25P
- MAVEN:GHSA-87QX-G5WG-MWMJ
- MAVEN:GHSA-8QXG-MFF5-J3WC
- MAVEN:GHSA-GV86-43RV-79M2
- MAVEN:GHSA-GX69-6CP4-HXRJ
- MAVEN:GHSA-MC6J-H948-V2P6
- MAVEN:GHSA-QJ2W-MW2R-PV39
- MS:CVE-2016-7798
- MS:CVE-2018-16395
- MS:CVE-2019-15845
- MS:CVE-2019-16201
- MS:CVE-2019-16254
- MS:CVE-2019-16255
- openSUSE-SU-2019:1771-1
- openSUSE-SU-2020:0395-1
- openSUSE-SU-2020:0586-1
- RHBA-2019:3384
- RHSA-2018:0378
- RHSA-2018:3738
- RHSA-2019:1235
- RHSA-2019:1972
- RHSA-2019:2028
- RHSA-2020:2462
- RHSA-2021:2587
- RHSA-2021:2588
- RLBA-2019:3384
- RLSA-2019:1972
- RLSA-2021:2587
- RLSA-2021:2588
- RUBYSEC:JSON-2020-10663
- RUBYSEC:OPENSSL-2016-7798
- RUBYSEC:OPENSSL-2017-14033
- RUBYSEC:OPENSSL-2018-16395
- RUBYSEC:PUMA-2020-5247
- RUBYSEC:RUBYGEMS-UPDATE-2017-0899
- RUBYSEC:RUBYGEMS-UPDATE-2017-0900
- RUBYSEC:RUBYGEMS-UPDATE-2017-0901
- RUBYSEC:RUBYGEMS-UPDATE-2017-0902
- RUBYSEC:RUBYGEMS-UPDATE-2017-0903
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000073
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000074
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000075
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000076
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000077
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000078
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000079
- RUBYSEC:RUBYGEMS-UPDATE-2019-8320
- RUBYSEC:RUBYGEMS-UPDATE-2019-8321
- RUBYSEC:RUBYGEMS-UPDATE-2019-8322
- RUBYSEC:RUBYGEMS-UPDATE-2019-8323
- RUBYSEC:RUBYGEMS-UPDATE-2019-8324
- RUBYSEC:RUBYGEMS-UPDATE-2019-8325
- RUBYSEC:TMPDIR-2021-28966
- RUBYSEC:WEBRICK-2017-10784
- SSA:2017-188-01
- SSA:2017-261-03
- SSA:2017-353-01
- SSA:2018-088-01
- SUSE-SU-2017:0914-1
- SUSE-SU-2017:1067-1
- SUSE-SU-2017:3237-1
- SUSE-SU-2017:3277-1
- SUSE-SU-2018:0003-1
- SUSE-SU-2019:1804-1
- SUSE-SU-2020:0737-1
- SUSE-SU-2020:0995-1
- SUSE-SU-2020:1901-1
- USN-3365-1
- USN-3382-1
- USN-3382-2
- USN-3439-1
- USN-3515-1
- USN-3528-1
- USN-3553-1
- USN-3621-1
- USN-3621-2
- USN-3626-1
- USN-3685-1
- USN-3685-2
- USN-3808-1
- USN-3945-1
- USN-4201-1
- USN-4882-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/yast2-ruby-bindings?arch=x86_64&distro=sles-12&sp=2 | suse | yast2-ruby-bindings | < 3.1.53-9.8.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/yast2-ruby-bindings?arch=s390x&distro=sles-12&sp=2 | suse | yast2-ruby-bindings | < 3.1.53-9.8.1 | sles-12 | s390x | |
Affected | pkg:rpm/suse/yast2-ruby-bindings?arch=ppc64le&distro=sles-12&sp=2 | suse | yast2-ruby-bindings | < 3.1.53-9.8.1 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=5 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=4 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=3 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=2 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=5 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=4 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=3 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=2 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=5 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=4 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=3 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=2 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=5 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=4 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=3 | suse | ruby2.1 | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=5 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=4 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=3 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=2 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=5 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=4 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=3 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=2 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=5 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=4 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=3 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=2 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=5 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=4 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=3 | suse | ruby2.1-stdlib | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=5 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=4 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=3 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=2 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=5 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=4 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=3 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=2 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | s390x | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=5 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=4 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=3 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=2 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | ppc64le | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=5 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=4 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | aarch64 | |
Affected | pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=3 | suse | libruby2_1-2_1 | < 2.1.9-19.3.2 | sles-12 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |