Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wmq2-jc9m-xp4m

Опубликовано: 02 мая 2022
Источник: github
Github: Прошло ревью

Описание

Cross-site Scripting in in JRuby

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Пакеты

Наименование

org.jruby:jruby-core

maven
Затронутые версииВерсия исправления

< 1.4.1

1.4.1

EPSS

Процентиль: 62%
0.00425
Низкий

Дефекты

CWE-79

Связанные уязвимости

redhat
почти 16 лет назад

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

nvd
около 13 лет назад

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

debian
около 13 лет назад

The regular expression engine in JRuby before 1.4.1, when $KCODE is se ...

EPSS

Процентиль: 62%
0.00425
Низкий

Дефекты

CWE-79