Описание
YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 0.9.36-1 |
esm-apps/bionic | released | 0.9.12-2ubuntu0.1~esm1 |
esm-apps/focal | released | 0.9.24-1+deb11u1build0.20.04.1 |
esm-apps/jammy | released | 0.9.26-1ubuntu0.1 |
esm-apps/noble | not-affected | 0.9.36-1 |
esm-apps/xenial | released | 0.8.7.6+git20160220-3ubuntu0.1~esm1 |
focal | released | 0.9.24-1+deb11u1build0.20.04.1 |
jammy | released | 0.9.26-1ubuntu0.1 |
mantic | released | 0.9.28-2ubuntu0.1 |
Показывать по
Ссылки на источники
EPSS
5.4 Medium
CVSS3
Связанные уязвимости
YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb" template file. This vulnerability is fixed in 0.9.36.
YARD is a Ruby Documentation tool. The "frames.html" file within the Y ...
YARD's default template vulnerable to Cross-site Scripting in generated frames.html
EPSS
5.4 Medium
CVSS3