Search for packages
| purl | pkg:maven/org.jruby.joni/joni@0 |
| Tags | Ghost |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-djpm-b9q2-3qde
Aliases: CVE-2010-1330 GHSA-wmq2-jc9m-xp4m OSV-77297 |
XSS in the regular expression engine when processing invalid UTF-8 byte sequences The regular expression engine in this package, when `$KCODE` is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:46:47.546952+00:00 | GitLab Importer | Affected by | VCID-djpm-b9q2-3qde | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jruby.joni/joni/CVE-2010-1330.yml | 38.0.0 |