Skip to content

Commit

Permalink
Update gh-pages
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions committed Jan 29, 2025
1 parent cf3df10 commit da6e2cb
Show file tree
Hide file tree
Showing 61 changed files with 3,307 additions and 3,300 deletions.
3,338 changes: 1,669 additions & 1,669 deletions advisories/index.html

Large diffs are not rendered by default.

32 changes: 16 additions & 16 deletions categories/code-execution.html
Original file line number Diff line number Diff line change
Expand Up @@ -76,8 +76,8 @@ <h3>



<a href="/advisories/RUSTSEC-2024-0433.html">
RUSTSEC-2024-0433: Vulnerability in age
<a href="/advisories/RUSTSEC-2024-0432.html">
RUSTSEC-2024-0432: Vulnerability in rage
</a>
</h3>
<span><p>Malicious plugin names, recipients, or identities can cause arbitrary binary execution</p>
Expand All @@ -95,8 +95,8 @@ <h3>



<a href="/advisories/RUSTSEC-2024-0432.html">
RUSTSEC-2024-0432: Vulnerability in rage
<a href="/advisories/RUSTSEC-2024-0433.html">
RUSTSEC-2024-0433: Vulnerability in age
</a>
</h3>
<span><p>Malicious plugin names, recipients, or identities can cause arbitrary binary execution</p>
Expand Down Expand Up @@ -152,8 +152,8 @@ <h3>

<span class="tag high">HIGH</span>

<a href="/advisories/RUSTSEC-2024-0350.html">
RUSTSEC-2024-0350: Vulnerability in gix-fs
<a href="/advisories/RUSTSEC-2024-0348.html">
RUSTSEC-2024-0348: Vulnerability in gix-index
</a>
</h3>
<span><p>Traversal outside working tree enables arbitrary code execution</p>
Expand All @@ -171,8 +171,8 @@ <h3>

<span class="tag high">HIGH</span>

<a href="/advisories/RUSTSEC-2024-0349.html">
RUSTSEC-2024-0349: Vulnerability in gix-worktree
<a href="/advisories/RUSTSEC-2024-0350.html">
RUSTSEC-2024-0350: Vulnerability in gix-fs
</a>
</h3>
<span><p>Traversal outside working tree enables arbitrary code execution</p>
Expand All @@ -190,8 +190,8 @@ <h3>

<span class="tag high">HIGH</span>

<a href="/advisories/RUSTSEC-2024-0348.html">
RUSTSEC-2024-0348: Vulnerability in gix-index
<a href="/advisories/RUSTSEC-2024-0349.html">
RUSTSEC-2024-0349: Vulnerability in gix-worktree
</a>
</h3>
<span><p>Traversal outside working tree enables arbitrary code execution</p>
Expand Down Expand Up @@ -597,11 +597,11 @@ <h3>

<span class="tag critical">CRITICAL</span>

<a href="/advisories/RUSTSEC-2019-0012.html">
RUSTSEC-2019-0012: Vulnerability in smallvec
<a href="/advisories/RUSTSEC-2019-0022.html">
RUSTSEC-2019-0022: Vulnerability in portaudio-rs
</a>
</h3>
<span><p>Memory corruption in SmallVec::grow()</p>
<span><p>Stream callback function is not unwind safe</p>
</span>

</li>
Expand All @@ -616,11 +616,11 @@ <h3>

<span class="tag critical">CRITICAL</span>

<a href="/advisories/RUSTSEC-2019-0022.html">
RUSTSEC-2019-0022: Vulnerability in portaudio-rs
<a href="/advisories/RUSTSEC-2019-0012.html">
RUSTSEC-2019-0012: Vulnerability in smallvec
</a>
</h3>
<span><p>Stream callback function is not unwind safe</p>
<span><p>Memory corruption in SmallVec::grow()</p>
</span>

</li>
Expand Down
64 changes: 32 additions & 32 deletions categories/crypto-failure.html
Original file line number Diff line number Diff line change
Expand Up @@ -135,8 +135,8 @@ <h3>



<a href="/advisories/RUSTSEC-2024-0393.html">
RUSTSEC-2024-0393: Vulnerability in cggmp21
<a href="/advisories/RUSTSEC-2024-0391.html">
RUSTSEC-2024-0391: Vulnerability in paillier-zk
</a>
</h3>
<span><p>Ambiguous challenge derivation</p>
Expand All @@ -154,8 +154,8 @@ <h3>



<a href="/advisories/RUSTSEC-2024-0391.html">
RUSTSEC-2024-0391: Vulnerability in paillier-zk
<a href="/advisories/RUSTSEC-2024-0393.html">
RUSTSEC-2024-0393: Vulnerability in cggmp21
</a>
</h3>
<span><p>Ambiguous challenge derivation</p>
Expand Down Expand Up @@ -401,8 +401,8 @@ <h3>



<a href="/advisories/RUSTSEC-2023-0029.html">
RUSTSEC-2023-0029: Vulnerability in nats
<a href="/advisories/RUSTSEC-2023-0027.html">
RUSTSEC-2023-0027: Vulnerability in async-nats
</a>
</h3>
<span><p>TLS certificate common name validation bypass</p>
Expand All @@ -420,8 +420,8 @@ <h3>



<a href="/advisories/RUSTSEC-2023-0027.html">
RUSTSEC-2023-0027: Vulnerability in async-nats
<a href="/advisories/RUSTSEC-2023-0029.html">
RUSTSEC-2023-0029: Vulnerability in nats
</a>
</h3>
<span><p>TLS certificate common name validation bypass</p>
Expand Down Expand Up @@ -644,11 +644,11 @@ <h3>

<span class="tag medium">MEDIUM</span>

<a href="/advisories/RUSTSEC-2022-0026.html">
RUSTSEC-2022-0026: Vulnerability in openssl-src
<a href="/advisories/RUSTSEC-2022-0027.html">
RUSTSEC-2022-0027: Vulnerability in openssl-src
</a>
</h3>
<span><p>Incorrect MAC key used in the RC4-MD5 ciphersuite</p>
<span><p><code>OCSP_basic_verify</code> may incorrectly verify the response signing certificate</p>
</span>

</li>
Expand All @@ -663,11 +663,11 @@ <h3>

<span class="tag medium">MEDIUM</span>

<a href="/advisories/RUSTSEC-2022-0027.html">
RUSTSEC-2022-0027: Vulnerability in openssl-src
<a href="/advisories/RUSTSEC-2022-0026.html">
RUSTSEC-2022-0026: Vulnerability in openssl-src
</a>
</h3>
<span><p><code>OCSP_basic_verify</code> may incorrectly verify the response signing certificate</p>
<span><p>Incorrect MAC key used in the RC4-MD5 ciphersuite</p>
</span>

</li>
Expand Down Expand Up @@ -927,13 +927,13 @@ <h3>

<h3>


<a href="/advisories/RUSTSEC-2019-0030.html">
RUSTSEC-2019-0030: Vulnerability in streebog
<span class="tag medium">MEDIUM</span>
<a href="/advisories/RUSTSEC-2016-0002.html">
RUSTSEC-2016-0002: Vulnerability in hyper
</a>
</h3>
<span><p>Incorrect implementation of the Streebog hash functions</p>
<span><p>HTTPS MitM vulnerability due to lack of hostname verification</p>
</span>

</li>
Expand All @@ -946,13 +946,13 @@ <h3>

<h3>

<span class="tag high">HIGH</span>
<span class="tag critical">CRITICAL</span>

<a href="/advisories/RUSTSEC-2019-0025.html">
RUSTSEC-2019-0025: Vulnerability in serde_cbor
<a href="/advisories/RUSTSEC-2019-0019.html">
RUSTSEC-2019-0019: Vulnerability in blake2
</a>
</h3>
<span><p>Flaw in CBOR deserializer allows stack overflow</p>
<span><p>HMAC-BLAKE2 algorithms compute incorrect results</p>
</span>

</li>
Expand All @@ -965,13 +965,13 @@ <h3>

<h3>

<span class="tag medium">MEDIUM</span>
<span class="tag high">HIGH</span>

<a href="/advisories/RUSTSEC-2016-0002.html">
RUSTSEC-2016-0002: Vulnerability in hyper
<a href="/advisories/RUSTSEC-2019-0025.html">
RUSTSEC-2019-0025: Vulnerability in serde_cbor
</a>
</h3>
<span><p>HTTPS MitM vulnerability due to lack of hostname verification</p>
<span><p>Flaw in CBOR deserializer allows stack overflow</p>
</span>

</li>
Expand Down Expand Up @@ -1022,13 +1022,13 @@ <h3>

<h3>

<span class="tag critical">CRITICAL</span>
<a href="/advisories/RUSTSEC-2019-0019.html">
RUSTSEC-2019-0019: Vulnerability in blake2

<a href="/advisories/RUSTSEC-2019-0030.html">
RUSTSEC-2019-0030: Vulnerability in streebog
</a>
</h3>
<span><p>HMAC-BLAKE2 algorithms compute incorrect results</p>
<span><p>Incorrect implementation of the Streebog hash functions</p>
</span>

</li>
Expand Down
Loading

0 comments on commit da6e2cb

Please sign in to comment.