Skip to content

Commit e5c78e4

Browse files
committed
Use cve.org instead of nist.gov
1 parent f6e9921 commit e5c78e4

File tree

98 files changed

+115
-115
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+115
-115
lines changed

de/news/_posts/2012-02-16-security-fix-for-ruby-openssl-module.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,6 @@ um CVE-2011-3389 durchlesen.
5555

5656

5757
[1]: http://www.openssl.org/~bodo/tls-cbc.txt
58-
[2]: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
58+
[2]: https://www.cve.org/CVERecord?id=CVE-2011-3389
5959
[3]: https://bugs.ruby-lang.org/5353
6060
[4]: http://mla.n-z.jp/?ruby-talk=393484

de/news/_posts/2014-04-10-severe-openssl-vulnerability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ In der OpenSSL-Implementation der Heartbeat-Erweiterung (`RFC6520`) von TLS/DTLS
1212
(Protokolle zum Verschlüsseln der Transportschicht) wurde eine
1313
kritische Sicherheitslücke entdeckt. Es handelt sich hierbei um ein
1414
schwerwiegendes Sicherheitsproblem, dem die CVE-Kennung
15-
[CVE-2014-0160](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160)
15+
[CVE-2014-0160](https://www.cve.org/CVERecord?id=CVE-2014-0160)
1616
zugewiesen wurde.
1717

1818
Seine Ausnutzung kann das Auslesen des Serverspeichers durch den

de/news/_posts/2014-08-19-ruby-1-9-2-p330-released.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,4 +54,4 @@ Wir ermutigen Sie dazu, auf eine stabile und unterstützte
5454
[Version von Ruby](https://www.ruby-lang.org/de/downloads/)
5555
zu aktualisieren.
5656

57-
[CVE-2014-6438]: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6438
57+
[CVE-2014-6438]: https://www.cve.org/CVERecord?id=CVE-2014-6438

de/news/_posts/2019-08-28-multiple-jquery-vulnerabilities-in-rdoc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ wurde.
1818

1919
Es wurden die folgenden Schwachstellen gemeldet:
2020

21-
* [CVE-2012-6708](https://nvd.nist.gov/vuln/detail/CVE-2012-6708)
22-
* [CVE-2015-9251](https://nvd.nist.gov/vuln/detail/CVE-2015-9251)
21+
* [CVE-2012-6708](https://www.cve.org/CVERecord?id=CVE-2012-6708)
22+
* [CVE-2015-9251](https://www.cve.org/CVERecord?id=CVE-2015-9251)
2323

2424
Es wird allen Ruby-Nutzern nachdrücklich empfohlen, die Ruby-Version
2525
zu aktualisieren oder wenigstens einen der nachfolgenden Workarounds

en/news/_posts/2012-02-16-security-fix-for-ruby-openssl-module.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,6 @@ details, please find discussions and resources around CVE-2011-3389.
4545

4646

4747
[1]: http://www.openssl.org/~bodo/tls-cbc.txt
48-
[2]: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
48+
[2]: https://www.cve.org/CVERecord?id=CVE-2011-3389
4949
[3]: https://bugs.ruby-lang.org/5353
5050
[4]: http://mla.n-z.jp/?ruby-talk=393484

en/news/_posts/2014-04-10-severe-openssl-vulnerability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ lang: en
1111
There is a severe vulnerability in OpenSSL's implementation of the TLS/DTLS
1212
(transport layer security protocols) heartbeat extension (`RFC6520`).
1313
This a serious vulnerability which has been assigned the CVE identifier
14-
[CVE-2014-0160](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160).
14+
[CVE-2014-0160](https://www.cve.org/CVERecord?id=CVE-2014-0160).
1515

1616
Exploitation may lead to disclosure of memory contents from the server to the
1717
client and from the client to the server. An attacker can remotely retrieve

en/news/_posts/2014-08-19-ruby-1-9-2-p330-released.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,4 @@ You can read the original report on the bug tracker:
5252
We encourage you to upgrade to a stable and maintained
5353
[version of Ruby](https://www.ruby-lang.org/en/downloads/).
5454

55-
[CVE-2014-6438]: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6438
55+
[CVE-2014-6438]: https://www.cve.org/CVERecord?id=CVE-2014-6438

en/news/_posts/2019-08-28-multiple-jquery-vulnerabilities-in-rdoc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ All Ruby users are recommended to update Ruby to the latest release which includ
1616

1717
The following vulnerabilities have been reported.
1818

19-
* [CVE-2012-6708](https://nvd.nist.gov/vuln/detail/CVE-2012-6708)
20-
* [CVE-2015-9251](https://nvd.nist.gov/vuln/detail/CVE-2015-9251)
19+
* [CVE-2012-6708](https://www.cve.org/CVERecord?id=CVE-2012-6708)
20+
* [CVE-2015-9251](https://www.cve.org/CVERecord?id=CVE-2015-9251)
2121

2222
It is strongly recommended for all Ruby users to upgrade your Ruby installation or take one of the following workarounds as soon as possible.
2323
You also have to re-generate existing RDoc documentations to completely mitigate the vulnerabilities.

en/news/_posts/2021-05-02-os-command-injection-in-rdoc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ It is recommended that all Ruby users update RDoc to the latest version that fix
1515

1616
The following vulnerability has been reported.
1717

18-
* [CVE-2021-31799](https://nvd.nist.gov/vuln/detail/CVE-2021-31799)
18+
* [CVE-2021-31799](https://www.cve.org/CVERecord?id=CVE-2021-31799)
1919

2020
RDoc used to call `Kernel#open` to open a local file. If a Ruby project has a file whose name starts with `|` and ends with `tags`, the command following the pipe character is executed. A malicious Ruby project could exploit it to run an arbitrary command execution against a user who attempts to run `rdoc` command.
2121

en/news/_posts/2021-07-07-starttls-stripping-in-net-imap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ lang: en
99
---
1010

1111
A StartTLS stripping vulnerability was discovered in Net::IMAP.
12-
This vulnerability has been assigned the CVE identifier [CVE-2021-32066](https://nvd.nist.gov/vuln/detail/CVE-2021-32066).
12+
This vulnerability has been assigned the CVE identifier [CVE-2021-32066](https://www.cve.org/CVERecord?id=CVE-2021-32066).
1313
We strongly recommend upgrading Ruby.
1414

1515
net-imap is a default gem in Ruby 3.0.1 but it has a packaging issue, so please upgrade Ruby itself.

0 commit comments

Comments
 (0)