Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-1330

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.4%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2010-1330
  • Jruby » Jruby » Version: N/A
    cpe:2.3:a:jruby:jruby:-
  • Jruby » Jruby » Version: 0.9.0
    cpe:2.3:a:jruby:jruby:0.9.0
  • Jruby » Jruby » Version: 0.9.1
    cpe:2.3:a:jruby:jruby:0.9.1
  • Jruby » Jruby » Version: 0.9.2
    cpe:2.3:a:jruby:jruby:0.9.2
  • Jruby » Jruby » Version: 0.9.8
    cpe:2.3:a:jruby:jruby:0.9.8
  • Jruby » Jruby » Version: 0.9.9
    cpe:2.3:a:jruby:jruby:0.9.9
  • Jruby » Jruby » Version: 1.0
    cpe:2.3:a:jruby:jruby:1.0
  • Jruby » Jruby » Version: 1.0.0
    cpe:2.3:a:jruby:jruby:1.0.0
  • Jruby » Jruby » Version: 1.0.1
    cpe:2.3:a:jruby:jruby:1.0.1
  • Jruby » Jruby » Version: 1.0.2
    cpe:2.3:a:jruby:jruby:1.0.2
  • Jruby » Jruby » Version: 1.0.3
    cpe:2.3:a:jruby:jruby:1.0.3
  • Jruby » Jruby » Version: 1.1
    cpe:2.3:a:jruby:jruby:1.1
  • Jruby » Jruby » Version: 1.1.1
    cpe:2.3:a:jruby:jruby:1.1.1
  • Jruby » Jruby » Version: 1.1.2
    cpe:2.3:a:jruby:jruby:1.1.2
  • Jruby » Jruby » Version: 1.1.3
    cpe:2.3:a:jruby:jruby:1.1.3
  • Jruby » Jruby » Version: 1.1.4
    cpe:2.3:a:jruby:jruby:1.1.4
  • Jruby » Jruby » Version: 1.1.5
    cpe:2.3:a:jruby:jruby:1.1.5
  • Jruby » Jruby » Version: 1.1.6
    cpe:2.3:a:jruby:jruby:1.1.6
  • Jruby » Jruby » Version: 1.2.0
    cpe:2.3:a:jruby:jruby:1.2.0
  • Jruby » Jruby » Version: 1.3.0
    cpe:2.3:a:jruby:jruby:1.3.0
  • Jruby » Jruby » Version: 1.3.1
    cpe:2.3:a:jruby:jruby:1.3.1
  • Jruby » Jruby » Version: 1.4.0
    cpe:2.3:a:jruby:jruby:1.4.0


Contact Us

Shodan ® - All rights reserved