Search for packages
purl | pkg:gem/rdoc@1.0.3 |
Tags | Ghost |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-fhgh-jkwa-aaah
Aliases: CVE-2020-11023 GHSA-jpcq-cgw6-v4j6 |
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
Affected by 6 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2024-09-17T22:47:11.171207+00:00 | GitLab Importer | Affected by | VCID-fhgh-jkwa-aaah | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11023.yml | 34.0.1 |
2024-01-03T18:08:19.714340+00:00 | GitLab Importer | Affected by | VCID-fhgh-jkwa-aaah | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rdoc/CVE-2020-11023.yml | 34.0.0rc1 |