Skip to content

[Snyk] Fix for 4 vulnerabilities

Alexis Dupovac requested to merge snyk-fix-cbf3fd2a45fd80974658004e671b63fe into master

Snyk has created this PR to fix one or more vulnerable packages in the `rubygems` dependencies of this project.

Changes included in this Merge Request

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • Gemfile
Warning
Failed to update the Gemfile.lock, please update manually before merging.

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
low severity 558/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 3.3
Out-of-bounds Read
SNYK-RUBY-COMMONMARKER-3318398
No Proof of Concept
low severity 461/1000
Why? Recently disclosed, Has a fix available, CVSS 3.5
Denial of Service (DoS)
SNYK-RUBY-COMMONMARKER-3318399
No No Known Exploit
medium severity 668/1000
Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 5.5
Denial of Service (DoS)
SNYK-RUBY-COMMONMARKER-3318400
No Proof of Concept
low severity 461/1000
Why? Recently disclosed, Has a fix available, CVSS 3.5
Denial of Service (DoS)
SNYK-RUBY-COMMONMARKER-3318401
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this Merge Request to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS)

Merge request reports

Loading