Maxim Integrated's IoT development kit.
Dependencies: MAX30101 MAX30003 MAX113XX_Pixi MAX30205 max32630fthr USBDevice
Diff: tools/Rats-2.4/rats-ruby.xml
- Revision:
- 7:2c9c8b6a28a7
- Parent:
- 6:aeb5a4c194c3
- Child:
- 8:2b6bfa8d9e36
--- a/tools/Rats-2.4/rats-ruby.xml Tue Mar 20 16:28:33 2018 +0300 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,344 +0,0 @@ -<!DOCTYPE RATS [ - <!ENTITY rubysafelevel "Ruby safe level 2 disables this function as it could be potentially dangerous. Verify this function is being used in a safe manner."> - -]> - -<VulnDB lang="ruby"> - - - <Vulnerability> - <Name>umask</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>flock</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>ioctl</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>stat</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>fork</Name> - <Info> - <Severity>Low</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>syscall</Name> - <Info> - <Severity>High</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>trap</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>setpgid</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>edgid</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>setsid</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>setpriority</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>autoload</Name> - <Info> - <Severity>High</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>chmod</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>chown</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>lstat</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>truncate</Name> - <Info> - <Severity>Medium</Severity> - <Description>&rubysafelevel;</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>untaint</Name> - <Info> - <Severity>Medium</Severity> - <Description>Verify variable is properly validated from tainted input.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>send_files</Name> - <Info> - <Severity>Medium</Severity> - <Description>Unchecked user input could allow director traversal attacks.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>system</Name> - <Info> - <Severity>High</Severity> - <Description>Make sure user data is not pass to system.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>exec</Name> - <Info> - <Severity>High</Severity> - <Description>Make sure user data is not passed to exec.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>open</Name> - <Info> - <Severity>Medium</Severity> - <Description>This method allows I/O access outside of the application. All I/O should be validated.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>params</Name> - <Info> - <Severity>Medium</Severity> - <Description>Use of params, verify all user values are checked before using. Never pass params directly to a new object i.e. Object.new(params[:user])</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>chmod_R</Name> - <Info> - <Severity>Medium</Severity> - <Description></Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>chown_R</Name> - <Info> - <Severity>Medium</Severity> - <Description></Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>ln_s</Name> - <Info> - <Severity>Medium</Severity> - <Description></Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>mkdir_p</Name> - <Info> - <Severity>Medium</Severity> - <Description></Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>mkpath</Name> - <Info> - <Severity>Medium</Severity> - <Description></Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>touch</Name> - <Info> - <Severity>Medium</Severity> - <Description></Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>popen</Name> - <Info> - <Severity>High</Severity> - <Description>Unchecked user input could all exectuion of system commands.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>popen3</Name> - <Info> - <Severity>High</Severity> - <Description>Unchecked user input could all exectuion of system commands.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>load</Name> - <Info> - <Severity>Low</Severity> - <Description>Unchecked user input could all loading of rouge scripts.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>rand</Name> - <Info> - <Severity>Medium</Severity> - <Description>Make sure this function is not being used for any security related tasks.</Description> - </Info> - </Vulnerability> - - <Vulnerability> - <Name>srand</Name> - <Info> - <Severity>Medium</Severity> - <Description>Make sure this function is not being used for any security related tasks.</Description> - </Info> - </Vulnerability> - <!--TOCTTOU Section --> - - <Vulnerability> - <Name>exist?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>exists?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>rm_r</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>safe_unlink</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>rm_rf</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>rmtree</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>remove_entry_secure</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>zero?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>identical?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>executable?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>directory?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>file?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - - <Vulnerability> - <Name>empty?</Name> - <RaceCheck>1</RaceCheck> - </Vulnerability> - -</VulnDB> - - - - -