cap-strap 0.1.2

2 security vulnerabilities found in version 0.1.2

cap-strap Gem for Ruby Hardcoded Password Crypt Hash Salt Weakness

high severity OSVDB-108575
high severity OSVDB-108575

cap-strap Gem for Ruby contains a flaw that is due to the application using a hardcoded default 'sa' salt for password encryption. This may allow a local attacker to more easily decrypt passwords.

cap-strap Gem for Ruby Process Table Local Plaintext Credential Disclosure

high severity CVE-2014-4992
high severity CVE-2014-4992

cap-strap Gem for Ruby contains a flaw that is due to the application exposing credential information in plaintext in the process table listing. This may allow a local attacker to gain access to credential information.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.