mirror of
https://github.com/jekyll/jekyll.git
synced 2026-04-06 03:01:43 -04:00
*Note*: Please release a new gem version of jekyll after merging this. More information at: http://osvdb.org/show/osvdb/120415 `redcarpet Gem for Ruby contains a flaw that allows a cross-site scripting (XSS) attack. This flaw exists because the parse_inline() function in markdown.c does not validate input before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.`9fc00d08148e707ebb94http://social.schiessle.org/display/b38b1460c2b201329b1f4860008dbc6c https://gemnasium.com/gems/redcarpet/versions/3.2.3 /cc @parkr @envygeeks
40 lines
876 B
Ruby
40 lines
876 B
Ruby
source 'https://rubygems.org'
|
|
gemspec
|
|
|
|
gem 'pygments.rb', '~> 0.6.0'
|
|
gem 'redcarpet', '~> 3.2.3'
|
|
gem 'toml', '~> 0.1.0'
|
|
gem 'jekyll-paginate', '~> 1.0'
|
|
gem 'jekyll-gist', '~> 1.0'
|
|
gem 'jekyll-coffeescript', '~> 1.0'
|
|
gem 'classifier-reborn', '~> 2.0'
|
|
|
|
gem 'rake', '~> 10.1'
|
|
gem 'rdoc', '~> 3.11'
|
|
gem 'redgreen', '~> 1.2'
|
|
gem 'shoulda', '~> 3.5'
|
|
gem 'cucumber', '1.3.18'
|
|
gem 'maruku', '~> 0.7.0'
|
|
gem 'rdiscount', '~> 2.0'
|
|
gem 'launchy', '~> 2.3'
|
|
gem 'simplecov', '~> 0.9'
|
|
gem 'mime-types', '~> 1.5'
|
|
gem 'jekyll_test_plugin'
|
|
gem 'jekyll_test_plugin_malicious'
|
|
gem 'liquid-c', '~> 3.0'
|
|
gem 'minitest'
|
|
gem 'minitest-reporters'
|
|
gem 'minitest-profile'
|
|
gem 'test-unit' if RUBY_PLATFORM =~ /cygwin/ || RUBY_VERSION.start_with?("2.2")
|
|
gem 'rspec-mocks'
|
|
|
|
if ENV['BENCHMARK']
|
|
gem 'rbtrace'
|
|
gem 'stackprof'
|
|
gem 'benchmark-ips'
|
|
end
|
|
|
|
if ENV['PROOF']
|
|
gem 'html-proofer', '~> 2.0'
|
|
end
|