profile
viewpoint
If you are wondering where the data of this site comes from, please visit https://api.github.com/users/rosenfeld/events. GitMemory does not store any data, but only uses NGINX to cache data for a period of time. The idea behind GitMemory is simply to give users a better reading experience.
Rodrigo Rosenfeld Rosas rosenfeld e-Core Vitória-ES, Brazil https://rosenfeld.herokuapp.com/en

jquery-ui-rails/jquery-ui-rails 1131

jQuery UI for the Rails asset pipeline

rosenfeld/active_record_migrations 104

ActiveRecord Stand-alone Migrations (for non-Rails projects)

rosenfeld/auto_reloader 60

A transparent code reloader.

rosenfeld/conque-term 51

git-svn mirror of http://code.google.com/p/conque/

grails/grails-howtos 50

The source and build for a set of Grails HOWTO documents

pledbrook/grails-doc 14

Documentation Project For The Grails Web Application Framework

rosenfeld/cert-generator 6

Docker container to generate auto-signed dev suited root CA and certificates from web interface

rosenfeld/chords-processor 3

Chords Processor

rosenfeld/command-reference 3

Miscelaneous tips with command references for various tasks

release TarekRaafat/autoComplete.js

v10.1.5

released time in 4 hours

release grafana/grafana

v8.0.3

released time in 5 hours

release usablica/intro.js

v4.1.0

released time in 5 hours

startedrust-db/barrel

started time in 9 hours

push eventrubysec/ruby-advisory-db

Reed Loden

commit sha 78235db7a0d6911614d1521584006bc6a1e64331

s/http/https/

view details

push time in 2 days

push eventrubysec/ruby-advisory-db

Reed Loden

commit sha e4ceaead3ecf33de3febbb7893e54314d49079f4

Swap out URLs for CVE-2012-6684

view details

push time in 2 days

push eventrubysec/ruby-advisory-db

Reed Loden

commit sha efb49e3d39926aa593656e9c100b64acb459d116

Sync GitHub Security Advisories * Add CVE-2021-20259 for foreman_fog_proxmox

view details

push time in 2 days

issue commentrubysec/ruby-advisory-db

Add advisory for bindata

Hello, I am with the GitHub Security Lab team. We are evaluating this to see if assigning a CVE makes sense CC @reedloden . Can someone articulate the security impact more clearly? The linked blog article discusses the use of constantize creates a memory leak, but in the linked commit there is not any code change involving constantize.

Is the "Potential DoS" simply due to the previous implementation being inneficient?

kuahyeow

comment created time in 2 days

release grafana/grafana

v7.5.8

released time in 2 days

release TarekRaafat/autoComplete.js

v10.1.4

released time in 2 days

release rollup/rollup

v2.52.0

released time in 2 days

release rollup/rollup

v2.51.2

released time in 2 days

push eventrubysec/ruby-advisory-db

Orien Madgwick

commit sha be083ce5ed65469e8a6a9bead08a6cce9c7e4451

Mark Rails ~> 6.0.4 as patched (#478)

view details

push time in 2 days

PR merged rubysec/ruby-advisory-db

Mark Rails ~> 6.0.4 as patched

I missed one in #477. Mark CVE-2021-22881 as patched in Rails 6.0.4.

+1 -1

0 comment

1 changed file

orien

pr closed time in 2 days

PR opened rubysec/ruby-advisory-db

Mark Rails ~> 6.0.4 as patched

I missed one in #477. Mark CVE-2021-22881 as patched in Rails 6.0.4.

+1 -1

0 comment

1 changed file

pr created time in 2 days

push eventrubysec/ruby-advisory-db

Orien Madgwick

commit sha f484347a0d2026f513fa5a3c33b25425bec5b359

Mark Rails ~> 6.0.4 as patched (#477)

view details

push time in 2 days

PR merged rubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

Context

I'm receiving automated vulnerability alerts for today's release of Rails 6.0.4.

I believe this version of Rails is patched against these vulnerabilities.

Change

Mark Rails ~> 6.0.4 as patched for CVE-2021-22885, CVE-2021-22902, CVE-2021-22904, and CVE-2021-22880.

+4 -4

0 comment

4 changed files

orien

pr closed time in 2 days

Pull request review commentrubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

 patched_versions:   - "~> 5.2.4.6"   - "~> 5.2.6"   - "~> 6.0.3.7"

👍 Updated in 3f198f2.

orien

comment created time in 2 days

Pull request review commentrubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

 unaffected_versions: patched_versions:   - "~> 5.2.4, >= 5.2.4.5"   - "~> 6.0.3.5"

Instead, could we do: - "~> 6.0.3, >= 6.0.3.5"

orien

comment created time in 3 days

Pull request review commentrubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

 patched_versions:   - "~> 5.2.4.6"   - "~> 5.2.6"   - "~> 6.0.3.7"

Instead, could we do: - "~> 6.0.3, >= 6.0.3.7"

orien

comment created time in 3 days

Pull request review commentrubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

 patched_versions:   - "~> 5.2.4.6"   - "~> 5.2.6"   - "~> 6.0.3.7"

Instead, could we do: - "~> 6.0.3, >= 6.0.3.7"

orien

comment created time in 3 days

Pull request review commentrubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

 unaffected_versions:  patched_versions:   - "~> 6.0.3.7"

Instead, could we do: - "~> 6.0.3, >= 6.0.3.7"

orien

comment created time in 3 days

PR opened rubysec/ruby-advisory-db

Mark Rails `~> 6.0.4` as patched

Context

I'm receiving automated vulnerability alerts for today's release of Rails 6.0.4.

I believe this version of Rails is patched against these vulnerabilities.

Change

Mark Rails ~> 6.0.4 as patched for CVE-2021-22885, CVE-2021-22902, CVE-2021-22904, and CVE-2021-22880.

+4 -0

0 comment

4 changed files

pr created time in 3 days

release vercel/vercel

vercel@23.0.1

released time in 3 days

release mui-org/material-ui

v5.0.0-alpha.37

released time in 3 days

release grafana/grafana

v8.0.2

released time in 4 days

fork HoneyryderChuck/minitest

minitest provides a complete suite of testing facilities supporting TDD, BDD, mocking, and benchmarking.

http://docs.seattlerb.org/minitest/

fork in 4 days

release usablica/intro.js

4.0.0

released time in 5 days

created repositoryankane/pgvector-python

pgvector support for Python

created time in 6 days