Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.jruby.joni/joni@0
purl pkg:maven/org.jruby.joni/joni@0
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-djpm-b9q2-3qde
Aliases:
CVE-2010-1330
GHSA-wmq2-jc9m-xp4m
OSV-77297
XSS in the regular expression engine when processing invalid UTF-8 byte sequences The regular expression engine in this package, when `$KCODE` is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:46:47.546952+00:00 GitLab Importer Affected by VCID-djpm-b9q2-3qde https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jruby.joni/joni/CVE-2010-1330.yml 38.0.0