Search for vulnerabilities
Vulnerability details: VCID-7dbv-wt1s-aaak
Vulnerability ID VCID-7dbv-wt1s-aaak
Aliases CVE-2020-7656
GHSA-q4m3-2j7h-f7xw
Summary JQuery allows Cross-site Scripting attacks via the `load` method. The `load` method fails to recognize and remove `<script>` HTML tags that contain a whitespace character such as `</script >`.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4211
rhas Low https://access.redhat.com/errata/RHSA-2021:4142
cvssv3 5.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7656.json
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00154 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00209 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00209 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00209 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00209 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00281 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.00892 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.0102 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.0102 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.0102 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.0102 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01105 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01111 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01111 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
epss 0.01203 https://api.first.org/data/v1/epss?cve=CVE-2020-7656
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1850119
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-q4m3-2j7h-f7xw
cvssv3.1 6.1 https://github.com/jquery/jquery
generic_textual MODERATE https://github.com/jquery/jquery
cvssv3.1 6.1 https://github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203
generic_textual MODERATE https://github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203
cvssv3.1 6.1 https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
generic_textual MODERATE https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
cvssv3.1 6.1 https://github.com/jquery/jquery/commit/606b863edaff29035960e4d813b45d63b8d92876
generic_textual MODERATE https://github.com/jquery/jquery/commit/606b863edaff29035960e4d813b45d63b8d92876
cvssv3.1 6.1 https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#220-19-january-2013
generic_textual MODERATE https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#220-19-january-2013
cvssv3.1 6.1 https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L7481
generic_textual MODERATE https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L7481
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2020-7656
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-7656
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-7656
cvssv3.1 6.1 https://security.netapp.com/advisory/ntap-20200528-0001
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20200528-0001
cvssv3 6.1 https://snyk.io/vuln/SNYK-JS-JQUERY-569619
cvssv3.1 6.1 https://snyk.io/vuln/SNYK-JS-JQUERY-569619
generic_textual MODERATE https://snyk.io/vuln/SNYK-JS-JQUERY-569619
cvssv3.1 6.1 https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
generic_textual MODERATE https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7656.json
https://api.first.org/data/v1/epss?cve=CVE-2020-7656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7656
https://github.com/jquery/jquery
https://github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203
https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
https://github.com/jquery/jquery/commit/606b863edaff29035960e4d813b45d63b8d92876
https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#220-19-january-2013
https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L7481
https://security.netapp.com/advisory/ntap-20200528-0001
https://security.netapp.com/advisory/ntap-20200528-0001/
https://snyk.io/vuln/SNYK-JS-JQUERY-569619
https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
https://www.npmjs.com/advisories/1524
https://www.oracle.com/security-alerts/cpujul2022.html
1850119 https://bugzilla.redhat.com/show_bug.cgi?id=1850119
cpe:2.3:a:jquery:jquery:*:*:*:*:*:node.js:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jquery:jquery:*:*:*:*:*:node.js:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
CVE-2020-7656 https://nvd.nist.gov/vuln/detail/CVE-2020-7656
CVE-2020-7656;CVE-2019-11358 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52141.txt
CVE-2020-7656.YML https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2020-7656.yml
GHSA-q4m3-2j7h-f7xw https://github.com/advisories/GHSA-q4m3-2j7h-f7xw
RHSA-2020:4211 https://access.redhat.com/errata/RHSA-2020:4211
RHSA-2021:4142 https://access.redhat.com/errata/RHSA-2021:4142
Data source Exploit-DB
Date added April 8, 2025
Description jQuery 3.3.1 - Prototype Pollution & XSS Exploit
Ransomware campaign use Unknown
Source publication date April 8, 2025
Exploit type webapps
Platform multiple
Source update date April 8, 2025
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7656.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery/blob/9e6393b0bcb52b15313f88141d0bd7dd54227426/src/ajax.js#L203
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery/commit/606b863edaff29035960e4d813b45d63b8d92876
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#220-19-january-2013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L7481
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-7656
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-7656
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-7656
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20200528-0001
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://snyk.io/vuln/SNYK-JS-JQUERY-569619
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1?language=en_US
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.52421
EPSS Score 0.00154
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.