Hacker News
Lobsters
- Ruby rest-client was hacked and infected with malware https://github.com/rest-client/rest-client/issues/713 14 comments ruby , security
- Rest-client gem is hijacked https://github.com/rest-client/rest-client/issues/713 31 comments programming
- rest-client Gem Hijacked https://github.com/rest-client/rest-client/issues/713 10 comments netsec
- Heads-up! rest-client gem compromised https://github.com/rest-client/rest-client/issues/713 18 comments ruby
Linking pages
- The year-long rash of supply chain attacks against open source is getting worse | Ars Technica https://arstechnica.com/information-technology/2019/08/the-year-long-rash-of-supply-chain-attacks-against-open-source-is-getting-worse/ 5 comments
- Gemfilecheck: Easiest way to check your Gemfile for security issues | Ruby Mule https://rubymule.com/blog/reduce-80-precent-of-attacks-by-updating-gemfile 4 comments
- The Case for 2FA, Post Rest-client Gem CVE https://rietta.com/blog/rest-client-cve/ 2 comments
- Code execution back door found in Ruby's rest-client library | Snyk https://snyk.io/blog/code-execution-back-door-found-in-rubys-rest-client-library/ 0 comments
- Google Cloud App Engine Environment Variables - DEV Community 👩💻👨💻 https://dev.to/mungell/google-cloud-app-engine-environment-variables-5990 0 comments
Would you like to stay up to date with Ruby? Checkout Ruby
Weekly.
Related searches:
Search whole site: site:github.com
Search title: [CVE-2019-15224] Version 1.6.13 published with malicious backdoor. · Issue #713 · rest-client/rest-client · GitHub
See how to search.