Total vulnerabilities in the database
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
Software | From | Fixed in |
---|---|---|
jruby / jruby | 1.4.0-rc1 | 1.4.0-rc1.x |
jruby / jruby | 0.9.2 | 0.9.2.x |
jruby / jruby | 1.0.3 | 1.0.3.x |
jruby / jruby | 1.2.0 | 1.2.0.x |
jruby / jruby | 0.9.9 | 0.9.9.x |
jruby / jruby | 1.1.6-rc1 | 1.1.6-rc1.x |
jruby / jruby | 1.1 | 1.1.x |
jruby / jruby | 1.1-rc2 | 1.1-rc2.x |
jruby / jruby | 1.2.0-rc2 | 1.2.0-rc2.x |
jruby / jruby | 1.0.2 | 1.0.2.x |
jruby / jruby | 1.0.0-rc2 | 1.0.0-rc2.x |
jruby / jruby | 1.1-rc1 | 1.1-rc1.x |
jruby / jruby | 1.0.1 | 1.0.1.x |
jruby / jruby | 1.1-rc3 | 1.1-rc3.x |
jruby / jruby | 0.9.8 | 0.9.8.x |
jruby / jruby | 1.1.2 | 1.1.2.x |
jruby / jruby | 1.3.0-rc1 | 1.3.0-rc1.x |
jruby / jruby | 1.3.0 | 1.3.0.x |
jruby / jruby | 1.0.0-rc3 | 1.0.0-rc3.x |
jruby / jruby | 1.1.4 | 1.1.4.x |
jruby / jruby | 1.4.0-rc3 | 1.4.0-rc3.x |
jruby / jruby | 1.4.0-rc2 | 1.4.0-rc2.x |
jruby / jruby | 1.3.1 | 1.3.1.x |
jruby / jruby | 1.1.6 | 1.1.6.x |
jruby / jruby | 1.1.1 | 1.1.1.x |
jruby / jruby | 1.2.0-rc1 | 1.2.0-rc1.x |
jruby / jruby | 0.9.0 | 0.9.0.x |
jruby / jruby | 1.3.0-rc2 | 1.3.0-rc2.x |
jruby / jruby | 1.1.3 | 1.1.3.x |
jruby / jruby | 1.0.0-rc1 | 1.0.0-rc1.x |
jruby / jruby | 0.9.1 | 0.9.1.x |
jruby / jruby | - | 1.4.0.x |
jruby / jruby | 1.1.5 | 1.1.5.x |
jruby / jruby | 1.0.0 | 1.0.0.x |
jruby / jruby | 1.1-beta1 | 1.1-beta1.x |
![]() |
- | 1.4.1 |