Vulnerabilities
Vulnerable Software
Jruby:  >> Jruby  >> 1.0.2  Security Vulnerabilities
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
CVSS Score
4.3
EPSS Score
0.004
Published
2012-11-23
JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
CVSS Score
5.0
EPSS Score
0.073
Published
2011-12-30


Contact Us

Shodan ® - All rights reserved