🚨 [security] Update mechanize: 2.7.2 → 2.7.7 (patch)#175
Open
depfu[bot] wants to merge 1 commit intomasterfrom
Open
🚨 [security] Update mechanize: 2.7.2 → 2.7.7 (patch)#175depfu[bot] wants to merge 1 commit intomasterfrom
depfu[bot] wants to merge 1 commit intomasterfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🚨 Your current dependencies have known security vulnerabilities 🚨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this update. Please take a good look at what changed and the test results before merging this pull request.
What changed?
✳️ mechanize (2.7.2 → 2.7.7) · Repo · Changelog
Security Advisories 🚨
🚨 Mechanize ruby gem Command Injection vulnerability
Commits
See the full diff on Github. The new version differs by more commits than we can show here.
Commits
See the full diff on Github. The new version differs by 56 commits:
Update the eTLD database to 2019-07-01 18:45:50 UTC.Add a tag in etld_data:commitAvoid loading ETLD_DATA_RB so that `rake etld_data etld_data:commit` worksQuit etld_data:commit if there is nothing to commitAutomatically add an entry to CHANGELOG.mdUpdate CHANGELOG.mdUpdate the eTLD database to 2018-04-17T23:50:25Z.Update CHANGELOG.mdUpdate the eTLD database to 2017-04-04T20:20:25Z.Update CHANGELOG.md2017Update the eTLD database to 2017-02-23T00:52:11Z.Update CHANGELOG.mdUpdate the eTLD database to 2016-11-29T01:22:03Z.Update the eTLD database to 2016-10-21T20:52:10Z.Remove the dependency on shouldaUpdate the license notice in README.md as wellUpdate the list of rubiesPush the forgotten change log updateUpdate the eTLD database to 2016-08-26T16:52:03Z.Update the URL for the PSLUpdate the license noticeUpdate bundler before installUpdate copyright yearsAdd a semi-autogenerated CHANGELOG.mdUpdate the eTLD database to 2016-06-15T16:22:11Z.Always set `@domain` to avoid a warning when `$VERBOSE` is onUpdate the eTLD database to 2016-03-10T21:22:02Z.Update development dependencies for obsolete rubiesUpdate the eTLD database to 2016-03-09T09:52:02Z.Fix support for Ruby 1.8Update the eTLD database to 2016-02-16T19:22:02Z.Update the eTLD database to 2016-01-28T23:22:02Z.Use the date as part of VERSIONv0.5.25Change the TLD with only 1 rule from .cy to .bdUpdate the eTLD database to 2015-09-29T17:22:03Z.Update the eTLD database to 2015-04-29T23:56:05Z.Alter licenses into a machine readable set of license names.Restrict i18n < 0.7.0 on ruby 1.8.v0.5.24Update the eTLD database to 2015-04-07T20:26:05Z.Update the eTLD database to 2015-02-18T02:56:08Z.Update the eTLD database to 2015-02-04T19:56:04Z.v0.5.23Update the eTLD database to 2014-12-18T02:26:03Z.Update the eTLD database to 2014-11-05T02:26:05Z.v0.5.22Update the eTLD database to 2014-10-27T15:26:07Z.v0.5.21Update the eTLD database to 2014-09-05T01:56:10Z.v0.5.20Update the eTLD database to 2014-08-14T00:56:09Z.Update the rvm list.Update the eTLD database to 2014-08-06T12:56:08Z.Add dependency on test-unit.Commits
See the full diff on Github. The new version differs by 10 commits:
Bump VERSION to 1.0.3Add an entry for the previous changeTreat comma as normal character in HTTP::Cookie.cookie_value_to_hashMerge branch 'update-travis'Use test-unit 2.x for Ruby 1.8Update bundler before installCache bundlerUpdate the list of rubiesDepend on Rake <11 if Ruby < 1.9Add jruby-18mode to allow_failures.Release Notes
2.5.0
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by 10 commits:
version bump to v2.5.0update CHANGELOGci: ensure bundler is up-to-dateci: ensure bundler is up-to-dateci: update concourse, split pipelines into master and prrakefile: rufo formattinggemspec: update dev dep for bundlergemspec: rufo formattingMerge pull request #90 from hanazuki/multiple-pubkeysRemove all the imported pubkeys from keyringCommits
See the full diff on Github. The new version differs by 8 commits:
Add .travis.yml to manifestUpdate version and history for 1.4.1Merge pull request #14 from grossjo/masterlatest rfc does not specify a limit on response header and this is insteadDeclare minitest development dependencyFix minitest 5 test class nameUpdate travis versionsSet license in gemspec.Release Notes
4.0.1 (from changelog)
4.0.0 (from changelog)
3.1.0
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by more commits than we can show here.
Security Advisories 🚨
🚨 Nokogiri::XML::Schema trusts input by default, exposing risk of an XXE vulnerability
🚨 xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
🚨 Nokogiri gem, via libxslt, is affected by multiple vulnerabilities
🚨 Nokogiri Command Injection Vulnerability
🚨 Nokogiri gem, via libxslt, is affected by improper access control vulnerability
Release Notes
1.11.1
1.11.0
1.10.10
1.10.9
1.10.8
1.10.7
1.10.6
1.10.5
1.10.4
1.10.3
1.10.2
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by more commits than we can show here.
Release Notes
0.0.7.7 (from changelog)
0.0.7.6 (from changelog)
Does any of this look wrong? Please let us know.
Commits
See the full diff on Github. The new version differs by 17 commits:
v0.1.2Hello 2016Make the default `http_get` proc act more like GooglebotFix context/should wordingFollow the deprecation warning from SimpleCov::Formatter::MultiFormatterUpdate real world tests, introducing Webmock+VCRTravis's ruby-head environment is still so broken.Adjust dependencies for Ruby 1.8.Drop ruby 1.9.2.I'm getting tired.Attemps don't seem to work. Disable coveralls for JRuby on Travis.Attempt to exclude jruby run without JRUBY_OPTS.Add --debug to JRUBY_OPTS under Travis-CI.Adjust some dependencies for Ruby 1.8.Introduce coveralls.Introduce simplecov.Add ruby-head and jruby-head.🆕 racc (added, 1.5.2)
🆕 webrick (added, 1.7.0)
Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with
@depfu rebase.All Depfu comment commands